0% found this document useful (0 votes)
11 views

Chapter wise question number of O Level (new syllabus)

Uploaded by

dxrk0069
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views

Chapter wise question number of O Level (new syllabus)

Uploaded by

dxrk0069
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Computer Science

Teacher: Maruf Ahmed

Chapter wise questions for Ordinary Level

First exam of the new syllabus was held in 2023. Subject code for the new syllabus and old syllabus remains
same.

PAPER 1 (Chapter 1 to 6) – Computer Systems

Chapter number Subject code/Variant/Session/Year/Q. No.


2210/12/M/J/24 – 1 (give the name of the data storage measurement that
is equal to 8 bits, State how many bits there are in a kibibyte (KiB)., Give
the name of the data storage measurement that is equal to 1024 gibibytes
(GiB), A 16-bit colour image has a resolution of 512 pixels wide by 512
pixels high.
Calculate the file size of the image in kibibytes (KiB). Show all your
working.)
2210/12/M/J/24 – 3 (Give the name of the number system that is base
16., Three denary numbers are entered into a computer. The computer
converts the numbers and
stores them as binary.
(i) Give the binary number that would be stored for each of the denary
numbers., Three denary numbers are entered into a computer. The
computer converts the numbers and
stores them as binary.
(i) Give the binary number that would be stored for each of the denary
numbers., The two binary integers 00110000 and 01100110 are added
together.
Chapter 1 (Data representation) Add the binary integers using binary addition and show your answer in
binary. Show all your
working., The denary integer –32 is stored as a two’s complement
integer.
Calculate the two’s complement integer that would be stored.
Show all your working.)
2210/11/M/J/24 – 2 (Hypertext markup language (HTML) colour codes
can be represented as hexadecimal.
(a) Tick (3) one box to show which statement about the hexadecimal
number system is incorrect, Denary numbers can be converted to
hexadecimal.
Convert the three denary numbers to hexadecimal.
2210/11/M/J/24 – 3 (The binary number 10100011 is stored in random
access memory (RAM).
A logical left shift of three places is performed on the binary number.
(a) Give the 8-bit binary number that will be stored after the shift has
taken place, Tick (3) one box to show which statement about a logical
left shift of two places is correct., 10100011 can be stored as a two’s
complement integer.
Convert the two’s complement integer 10100011 to denary. Show all
your working., The binary number is measured as a byte because it has 8
bits.
State how many bytes there are in a kibibyte (KiB))
0478/12/F/M/24 – 1 (Computers represent different types of data in
binary.
(a) Tick (✓) one box to show the reason why computers use binary to
represent data., Tick (✓) one box to identify the ASCII denary number
for the character ‘Q’., Give the binary number for the ASCII denary
number for ‘N’., Explain how the word ‘RED’ is represented using a
character set, (b) Explain why recording sound with a higher sampling
resolution creates a more accurate recording., Give one other way that
the accuracy of a sound recording can be improved.
0478/12/F/M/24 – 8 (Convert the denary number 236 into hexadecimal,
Give one benefit of using hexadecimal instead of binary to represent
data., Convert the two’s complement integer 10110111 into denary.,
Convert the denary number 45 into an 8-bit two’s complement integer.,
State the mathematical effect of a right shift of four places on a positive
binary integer.)
2210/13/O/N/23 – 1 c (State how many bits are equal to a byte., State
how many kibibytes (KiB) equal a mebibyte (MiB).)
2210/13/O/N/23 – 2 (Explain what is meant by a binary number system.,
Convert the denary nuyumbers 14, 59 and 234 to binary, Convert the
denary numbers 9, 26 and 65 to hexadecimal., Convert the positive
denary number 123 to 8-bit binary using two’s complement.
Show all your working., Add the binary values 00110011 and 01111000
using binary addition.
Give your answer in binary. Show all your working.)
2210/13/O/N/23 – 7 (State what is meant by the image resolution., State
what is meant by the image colour depth., Identify which compression
method the photographer uses., Give two other benefits of compressing
the image.)
2210/12/O/N/23 – 2 (Give the denary number for the binary number
stored in the register, Give the hexadecimal number for the binary
number stored in the register., A logical left shift of two places is
performed on the binary number stored in the register.
Complete the binary register to show its contents after this logical left
shift., The negative denary number −99 needs to be stored in the register.
Complete the register to show the binary number that would be stored,
using two’s complement. Show all your working., The number 01001100
is added to 11100011
Add the two 8-bit binary numbers, using binary addition.
Give your answer in binary. Show all your working.
2210/12/O/N/23 – 5 (Give one benefit of using a higher sample rate to
record the song., Give one drawback of using a higher sample rate to
record the song., Describe what is meant by sample resolution., Identify
the compression method that should be used.)
2210/11/M/J/23 – 1 (Tick (3) one box to show which statement about
the binary number system is correct.), Denary numbers are converted to
binary numbers to be processed by a computer.
Convert these three denary numbers to 8‑bit binary numbers.), Binary
numbers are stored in registers.
Negative denary numbers can be represented as binary using two’s
complement.
Complete the binary register for the denary number –78
You must show all your working., Two 8‑bit binary numbers are given.
Add the two 8‑bit binary numbers using binary addition. Two binary
numbers are added by a computer and an overflow error occurs.
Explain why the overflow error occurred.)
2210/11/M/J/23 – 2 a, b (State what is meant by the sample rate and
sample resolution.), Identify which type of compression has been used to
compress the sound file.,
0478/13/M/J/23 – 1 a (Convert the binary number to denary.), Convert
the binary number to hexadecimal.), A logical left shift of three places is
performed on the binary number.
(i) Give the 8-bit binary number that would be stored after this logical
left shift.), Tick (3) one box to show which statement is true about the
impact the logical left binary
shift would have on the binary number. Add the two 8-bit binary
numbers 11101110 and 00110001 using binary addition.
Give your answer in binary. Show all your working., The denary number
301 needs to be stored.
Calculate the least number of bits that can be used to store the denary
number 301., The hexadecimal number A4D needs to be stored.
Calculate the least number of bits that can be used to store the
hexadecimal number A4D)
2210/12/M/J/23 – 2 a (Convert the two binary numbers to hexadecimal),
2 b (A logical right shift of three places is performed on the binary
number.
(i) Complete the binary register to show its contents after this logical
right shift, State one effect this logical shift has on the binary number.), 2
c (Give two reasons why a programmer may use hexadecimal to
represent binary numbers), 2 d (Denary numbers can also be converted to
hexadecimal.)
2210/12/M/J/23 – 3 a (Describe how the text is converted to binary to be
processed by the computer.), 2 b I (A text file can be compressed using
lossless compression.
(i) State what effect this has on the file size.), Describe how lossless
compression compresses the text file.), Give two reasons why the text
file may have been compressed)
0478/12/F/M/23 – 3 a (Data storage is measured using binary
denominations.
Complete each conversion),
0478/12/F/M/23 – 4 a A wildlife photographer stores their digital images
on a computer.
(a) Complete the table by defining each term about images. Pixel,
resolution, 4 b (One of the images has a resolution of 1000 × 1000 and a
colour depth of 2 bytes.
Calculate the file size of the image. Give your answer in bytes. Show
your working.),
0478/12/F/M/23 – 4 d (The photographer compresses an image file
before it is emailed.
Give one reason why a file is compressed)
0478/12/F/M/23 – 6 a (Complete the table by writing the missing binary,
denary or hexadecimal value for each movement.)
2210/13/O/N/22 – 2 (Draw one line from each denary value to the
correctly converted 8-bit binary value), Give the hexadecimal value for
the 16-bit binary value 0000100110101110,
2210/13/O/N/22 – 3 (Jessica wants to store a large number of small
thumbnail images on a USB flash memory drive. Each thumbnail image
is 16-bit colour and is 100 pixels wide and 100 pixels high.
She has 5MB of storage space available on her USB flash memory drive.
Calculate how many images she can store in the 5MB of storage space.
Show all your working)
2210/13/O/N/22 – 6 c (The video files are compressed using lossy
compression.
Give two benefits of using lossy compression to compress the video
files)
2210/12/O/N/22 – 1 f I (Give the 12-bit binary value that is stored in the
register for each denary ticket number.), Show the denary ticket number
that would be given to the customer for each 12-bit binary
value., Show the hexadecimal value that represents each of the two 12-
bit binary values.)
2210/12/M/J/22 – 1 (Draw one line from each denary value to the
correctly converted 8-bit binary value.
, Give the correct denary value for the 12-bit binary value 000101010111
Show all your working,
2210/12/M/J/22 - 2 (Give the correct denary value for the 12-bit binary
value 000101010111
Show all your working, HTML colour codes and Media Access Control
(MAC) addresses are two examples of where
hexadecimal is used in Computer Science.
Give two other examples of where hexadecimal can be used in Computer
Science.)

2210/12/O/N/21 – 1 (Tick (✓) one box to show whether denary is a


base-2, base-10 or base-16 number system
(Convert these four hexadecimal values into denary values., Tick (✓)
one box to show the correct 8-bit binary value for each hexadecimal
value., Hexadecimal value 1B, Give one way that hexadecimal is used in
website development, Give one way that hexadecimal is used in low-
level programming)
2210/12/O/N/21 -5 b (Give three ways that lossy compression can
reduce the file size of the videos., Give one drawback of using lossy
compression to reduce the file size of the videos.) 5 c (Give one reason
why he would use lossless compression, rather than lossy compression,
for the videos., Give two disadvantages of Sammi using lossless
compression, rather than lossy compression, for the videos.
2210/11/M/J/21 – 1 a (denary to binary)
2210/11/M/J/21 –7 a (lossless compression for sound file, drawback,
benefit)
2210/12/M/J/21 – 1 a (denary to hex and binary), 1 b (benefits, to users,
of converting binary values to hexadecimal), 1 c (uses of hex)

2210/12/M/J/20-7 a (conversion from binary to denary), 7 b (conversion


from binary to hex),
2210/12/O/N/20-1b-ii (conversion from hex to binary),
2210/12/O/N/20- 1c-ii (compression technique description), 1c-iii
(benefits of compression)
2210/11/M/J/19-1 a (hex to binary), 1 b (MAC address), 1 c (uses of hex)
2210/11/M/J/19-5 (lossless compression on text file)

2210/12/M/J/19 - 4b(i) (math problem for image)

2210/12/O/N/19-1 (tick mark for memory size), 3 (analogue and digital


data), 4 a (binary to denary), 4 b (binary shift left), 4 c (effect of shift)
2210/12/O/N/19-5 a, b (lossy compression on music, advantage and
disadvantage of lossy)
2210/13/O/N/19-1c (hex to binary)
2210/13/O/N/19 - 1c(ii) (compression of video file)
2210/11/M/J/18-1 (F/B using different terms), 2 (hex to denary)
2210/11/M/J/18-4 (types of compression, lossless compression
description)
2210/12/M/J/18-1 (F/B of order of memory unit), 3 a (denary to binary),
3 b (binary to denary), 4 (hex to binary)
2210/12/O/N/18-1 a (denary to binary), 1 b (binary to hex, uses of hex,
benefits of hex to represent binary values)
2210/13/O/N/18-4 a (hex to binary), 4 b (why data is stored as binary in
computers)

2210/11/M/J/17-1 a (binary to hex), 1 b (Explain why a programmer


might prefer to read the instruction in hexadecimal rather than in binary),
1 c (uses of hex), 3 (tick mark for memory size)
2210/11/M/J/17 - 13 (benefits of compression, lossless and lossy)
2210/12/M/J/17-5 a (denary to binary), 5 b (binary in 8 and 16 bit
register), 5 c (use of binary), 5 d (binary to hex)
2210/12/O/N/17-1 (denary to binary),
3 a (difference between binary and denary), 3 b (process of converting
binary to denary)
2210/13/O/N/17-1b (hex to binary), 1c (why hexadecimal is used to
display the error code)
2210/11/M/J/16-7 a (denary to binary), 7 b (binary to denary), 12b
(denary to hex, hex to binary)

2210/12/M/J/16-3 a (hex to binary), 3 b (denary to binary, denary to hex)


2210/12/M/J/16-4a (how the size of a text file can be reduced)
2210/12/O/N/16-5 (binary right shift), 11a (hex to binary)
2210/13/O/N/16-10 a (denary to binary, binary to hex), 10 b (math
problem)
2210/11/M/J/15-8a (binary to denary), 8b (denary to binary), 9 (matching
of some values and math)
2210/12/M/J/15-5c (binary to denary), 10 a (denary to binary), 10 b
(shifting and then binary to hex)
2210/12/O/N/15-4 a i (hex to binary), 4 a ii (AND operation on binary), 4
a iii (binary to hex), 4 b i (HTML color tag representation), 4 b ii (how
HTML new color is created), 4 c i (MAC address parts), 4 c ii (why
MAC are used)
2210/13/O/N/15 - 9 a (math problem), 9 b (how MP3 files retain most of
the original music quality, MP3 file compression, MP3 file compression
format)
0478/12/F/M/17 - 7 (high definition video and a large text file
compression technique), 13 b (math problem)
0478/12/F/M/17 – 8 a (binary to denary, binary to hex), 8 b (ASCII value
for 9 in binary, denary, hex), 8 c (AND gate operation on binary), 12 a
(uses for hexadecimal and for each one give an example of hexadecimal
that matches the use), 12 b (why hexadecimal is used to represent binary
numbers)
0478/12/F/M/18 – 5 a (binary to hex), 5 b (why hex is used)
0478/12/F/M/18 - 9 (math problem sound related), 11 a (why smaller
file size?), 11 b (lossy compression description)
0478/12/F/M/19 – 1 a b (tick mark for memory size), 3 a (denary to
binary, binary to denary)
0478/12/F/M/19 – 4 c (why lossless instead of lossy)
0478/12/F/M/20 – 5 a (why binary is used to store data in a computer
system), 5 b (denary to binary), 5 c (hex to binary), 5 d (uses of hex),
0478/12/F/M/20 –3 d (how lossless compression reduces file)
0478/12/F/M/21 – 1 a (denary to binary), 1 b (largest denary value in 8
bit), 1 c (smallest number of bits to store 2000)
0478/12/F/M/21 – 2 a (how lossy compression creates the thumbnails.)
0478/12/F/M/22 – 1 (number conversion)
2 a (Give one example of an image format.), 2 b (Describe how a digital
image file is stored by a computer), 2 c (State what is meant by data
compression, Explain why Nadia compresses the digital image file
before emailing it.)
0478/12/F/M/22 – 2 c (State what is meant by data compression, Explain
why Nadia compresses the digital image file before emailing it.)

2210/12/M/J/24 – 2 (Tick (3) one box to show which of the terms is not a
method for transmitting data., Data is broken down into smaller units to
be transmitted from one device to another.
Give the name of the unit that data is broken down into., Data is often
encrypted when it is transmitted from one device to another.
(i) Explain how data is encrypted using symmetric encryption., Give the
purpose of encryption.)
2210/12/M/J/24 – 6 (The table contains statements about error detection
methods.
Complete the table by giving the correct error detection method for each
statement.
2210/11/M/J/24 – 4 (Data packets are transmitted across a network from
one computer to another computer.
(a) Describe the structure of a data packet., Packet switching is used to
transmit the data packets across the network.
Identify the device that controls which path is taken by each data packet.,
Serial data transmission is used to transmit the data packets across the
network.
2 (Data transmission)
Explain why serial data transmission is used to transmit the data
packets.)
2210/11/M/J/24 – 7 (Data is encrypted to keep it safe during
transmission.
Complete the paragraph about asymmetric encryption.
Use the terms from the list)
2210/11/M/J/24 – 9 a, b, c (A company owner has installed a new
network. Data is correct before it is transmitted across the
network.
The company owner is concerned that data might have errors after
transmission.
(a) Explain how the data might have errors after transmission., The
company owner decides to introduce an error detection system to check
the data for errors after transmission.
The error detection system uses an odd parity check and a positive
automatic repeat query (ARQ).
(i) Describe how the error detection system operates to check for errors.,
Give two other error detection methods that could be used
0478/12/F/M/24 – 6 e (Describe the role of the self-driving tractor and
the farmer’s computer in the echo check., Complete the parity byte for
the data.,
0478/12/F/M/24 – 7 (State the purpose of encrypting data., Describe the
differences between symmetric and asymmetric encryption, Identify two
items of data contained in a packet header., Give the purpose of a router
in the packet-switching process.)
2210/13/O/N/23 – 5 (Give one reason an error may occur when data is
transmitted., Tick (3) one box to show which error detection method does
not use a calculated value to
check for errors., Explain how an ARQ operates using a positive
acknowledgement method.
2210/12/O/N/23 – 6 (Complete the table by identifying which data
transmission methods are described.)
2210/11/M/J/23 – 2 c (Identify two pieces of data that would be included
in the header of each packet, Explain how the file is transmitted using
packet switching.)
0478/13/M/J/23 – 5 (Complete and annotate the diagram to demonstrate
how packet switching is used to transmit data across a network,
including the use of routers, from Device A to Device B.)
2210/12/M/J/23 – 4 a I (Describe how the photographs would be
transmitted using serial data transmission), Give two benefits of
transmitting the photographs using serial data transmission. State one
benefit of the student using parallel data transmission instead of serial
data transmission.
0478/12/F/M/23 – 5 a I (The request is sent using packet switching.
The structure of a packet of data has three elements. One element is the
packet header.
(i) Identify two items of data contained in a packet header.), Identify the
two other elements of a packet.), 5 b (Tick (✓) one box to identify
whether serial data transmission or parallel data transmission
is more suitable for this connection.
Explain the reasons for your choice.), (The connection will also use
full-duplex data transmission.
Define full-duplex data transmission.), Complete the parity bit for each
byte, (Explain how a parity block check might detect an error in
transmission that would not be detected by a parity byte check.),
(Identify the bit number and the byte number of the incorrect bit.)
2210/13/O/N/22 – 4 c I (Describe how data is transmitted using a USB
connection), 4 c ii (One benefit of a USB connection is that the cable can
only be inserted into the port one
way, so an incorrect connection cannot be made.
Give three other benefits of using a USB connection to connect a mobile
phone to a computer.)
2210/13/O/N/22 – 9 (A system uses parity checks and Automatic Repeat
requests (ARQ) to detect and correct errors
in the transmission of data.
Describe how parity checks and ARQ operate together to detect and
correct errors.)
2210/12/O/N/22 – 5 (Identify which bit has an error by giving the Byte
number and Bit number. Explain how you found the error.),

2210/12/O/N/21 – 3 a (Tick (✓) to show if each statement applies to


serial simplex, parallel simplex, parallel half-duplex or serial duplex data
transmission. Some statements may apply to more than one data
transmission method. 3 b (Give three benefits of using a USB
connection for this purpose.)
2210/11/M/J/21 - 2 c (benefits of USB, the type of transmission used in
USB), 8 a (parity checking), 8 b (why parity bit may not detect error), 8 c
(parallel half duplex, drawbacks of parallel),
2210/12/M/J/20-3 a (Symmetric encryption)
2210/12/M/J/20-8 a (benefits of USB)

2210/12/O/N/20-1a, 1 b i, 2 a (Even parity, odd parity tick mark), 2 b


(checksum discussion)
2210/13/O/N/20-5a (serial/parallel discussion), 5b (benefits of USB), 7 a
(even or odd parity tick mark), 7 b (why a parity check may not detect
data transmission errors), 7 c (another error checking method name)
2210/13/O/N/20 – 6 (Complete the paragraph using the list of given
terms. Not all terms may need to be used. Some terms may be used more
than once.) encryption
2210/12/M/J/19 - 6c (parallel duplex), 9 (parity bity fill up)
2210/12/O/N/19 - 9 a (duplex transmission tick mark), 9 b (serial or
parallel), 9 c (benefits of USB), 10 a (Explain what is meant by a check
digit and how it is used to detect errors.)
2210/13/O/N/19-1b I, ii (encryption), 1b(iii) (parity check and ARQ
together), 3 (F/B of transmission)
2210/11/M/J/18-3 (parity bit and explanation of why)
2210/12/M/J/18-5 (parity bit and explanation of why), 12b (error
detection method and description)

2210/12/O/N/18-7 (matching of internet terms), 9 (discussion of serial,


parallel and duplex transmission)
2210/13/O/N/18-2 a (filling up parity bit), 2 b (ARQ), 2 c (another
method name), 5 a (serial transmission), 5 b (application of serial), 5 c
(half duplex transmission)
2210/11/M/J/17-4 (tick mark on serial half duplex), 5 a (tick mark for
parity check), 5 b (ARQ)
2210/12/M/J/17-4 (discussion on parity check, check digit, checksum,
ARQ), 7 a (labeling of data transmission), 7 b (use of simplex, duplex), 7
c (IC, USB)
2210/12/O/N/17-4 (tick mark, why most suitable data transmission, two
methods of error checking)
2210/11/M/J/16-4 a(i, ii) (type of transmission, reasons for using USB),
9 (check digit calculation)

2210/12/M/J/16-4b (checksum), 6 a (tick mark of transmission), 6 b


(why parallel over serial)
2210/12/O/N/16-3 a (serial and parallel discussion), 3 b (Identify which
data transmission method would be most suitable for this connection), 4
a (circle the corrupt bit from parity block)
2210/13/O/N/16-3 (match of different terms), 5d (parity block)
2210/11/M/J/15-1 (serial and parallel discussion, benefit, use), 2 (USB
benefits)
2210/12/M/J/15-5 a (parity bit fill up), 5 b (parity block)
2210/12/O/N/15 - 7 a (check digit calculation), 7 b (parity bit filling up, a
situation in which it cannot detect corruption of a byte)

2210/13/O/N/15-2 b ii (filling up parity bit)


2210/13/O/N/15 - 10 (fill in the blanks-encryption)
0478/12/F/M/17 – 3 a (which transmission and why), 3 b (which type of
parity check), 3 c (another method name),
0478/12/F/M/17 – 4 a b (convert plain text to cipher text), 4 c (which
cipher text would be more secure),
0478/12/F/M/18 – 8 a (serial or parallel tick mark), 8 b (simplex, half
duplex, duplex tick mark)
0478/12/F/M/19 – 4 d (how a checksum detects errors, other methods of
error detection), 6 a (what is meant by USB)
0478/12/F/M/20 – 2 a (tick mark for transmission), 2 b (parity check), 2 c
(what is encryption, how the strength of encryption can be improved)
0478/12/F/M/21- 1 d (why serial over parallel, half duplex, checksum)
0478/12/F/M/22 – 2 c iii (Describe how the parity bits are used to detect
errors.), 2 c iv (Identify and describe one other method of error detection
used during the transmission of data.)

2 (Data transmission) 9618/31/32/O/N/21 – 6 a (Explain how packet switching is used to


transfer messages across the internet), 6 b (Outline the function of a
router in packet switching.)
9618/31/32/33/M/J/21 – 6 (Give two benefits and two drawbacks of
packet switching)
9608/31/33/O/N/19 -7 b I (Explain why packet switching is used when
sending data across the Internet.), 7 b ii (Describe the purpose of a packet
header.), 7 b iii (Identify three items that should be contained in a packet
header)
9608/32/O/N/15 – 3 c (A web page is transferred from a web server to a
home computer using the Internet. Explain how the web page is
transferred using packet switching.)

2210/12/M/J/24 – 5 (Instructions are processed by a central processing


unit (CPU) in a computer.
(a) Complete the paragraph about fetching an instruction into the CPU to
be processed.
Use the terms from the list., The CPU uses an instruction set to decode
the instruction.
State what is meant by an instruction set.)

0478/12/F/M/24 – 2 (a, b) The table contains five statements about the


role of registers in the fetch–decode–execute cycle of a CPU, Two of the
statements are not correct.
Identify the letter of each incorrect statement.
Suggest a corrected statement for each. State what is meant by a 3.5GHz
processor., Explain how the number of cores affects the performance of a
CPU., Explain how the amount of cache affects the performance of a
computer.,
2210/13/O/N/23 – 3 a (Circle three components that are built into the
CPU.), The CPU has cache.
Explain the purpose of the cache., The CPU has a component that
Chapter 3 Hardware (computer regulates the number of fetch–decode–execute cycles the
architecture & Embedded CPU can perform in a second.
system)
State the name of this component., The CPU has a component that
carries out all calculations and logical operations.
State the name of this component.)
2210/12/O/N/23 – 3 (State what is meant by clock speed., Explain the
effect this change will have on the performance of the CPU., The CPU
contains a memory address register (MAR).
Describe the role of the MAR in the fetch–decode–execute cycle., The
CPU has a list of all the machine code commands it can process.
State the name of this list of commands.
2210/12/O/N/23 – 4 A washing machine is an example of an embedded
system.
(Give two characteristics of an embedded system., Circle three other
examples of an embedded system.
0478/13/M/J/23 – 2 a, b, c (The self-checkout system has a central
processing unit (CPU).
The CPU has two cores.
(a) State the purpose of a core in the CPU.), The CPU is replaced with
one that has four cores.
Explain the effect this has on the performance of the self-checkout
system, Describe the role of a register in the CPU., Identify one bus that
can be found in the CPU and explain its purpose in the
fetch–decode–execute cycle.
2210/13/O/N/22 – 7 (Complete the paragraph using the list of terms. Not
all terms in the list need to be used.),

2210/12/O/N/22 – 1 d (Describe the stored program concept)


2210/12/M/J/20-1 a (name of registers), 1 b (stage of processing,
component for decoding),
2210/13/O/N/20-2 (components and registers f/b)
2210/12/M/J/19-3 (F/B on CPU)
2210/12/O/N/19-2 (components of Von Neumann architecture)
2210/13/O/N/19-7 a (main memory used in Von Neumann model, other
components in Von Neumann model)
2210/11/M/J/18-5 (matching of components of Von Neumann model)

2210/12/M/J/18-6 (F/B of components of Von Neumann model)


2210/13/O/N/18-11 (role of PC, MDR)
2210/11/M/J/17-6 (purpose of different buses)
2210/12/M/J/17-1 (names of buses)
2210/13/O/N/17-4 (matching of different components of a computer
system)
2210/12/O/N/16-6 (matching of different components of a computer
system)

2210/13/O/N/16-1 (stages of instruction cycle)


2210/11/M/J/15-7 a (matching of buses), 7 b (setting the order of fetch-
decode-execute cycle)
2210/13/O/N/15-3 a (contents of MAR, MDR during read operation),
(contents of MAR, MDR during write operation), 3 b (names of
registers), 3 c (functions of control unit)
0478/12/F/M/18 – 10 a (value in MAR, MDR), 10 b (stored program
concept)
0478/12/F/M/20 – 1 a (matching of different components of computer
system), 1 b (names of buses)

0478/12/F/M/21 – 8 a (stored program concept), 8 b (role of PC, control


bus)
2210/11/M/J/24 – 1 (A student has a portable tablet computer.
(a) Identify two input devices that could be built into the portable tablet
computer., Identify one output device that could be built into the portable
tablet computer., Identify one type of storage device that could be built
into the portable tablet computer.)
2210/13/O/N/23 – 1 a, b (Give two examples of an input device that
would be built into a mobile telephone., Give one example of an output
device that would be built into a mobile telephone.)
2210/12/O/N/23 – 7 (Identify two suitable input devices that can be used
to automatically read the tickets, Explain how the sensor and the
microprocessor are used to check whether the train door can
be closed.)
0478/13/M/J/23 – 2 d (The self-checkout system allows the user to input
their library membership number.
Give two appropriate input devices that would allow the user to do this.),
The self-checkout system uses a monitor to display information about the
book.
Users who are blind also need to use the self-checkout system.
Chapter 3 Hardware (input and Give an appropriate output device that would allow a blind user to be
output devices) given this information., The self-checkout system uses two types of
primary storage.
Circle two types of primary storage that would be used in the system.),
The self-checkout system is linked to a stock control system that is
updated every time a
book is borrowed from the library.
A microprocessor is used in the stock control system to update the stock.
Explain the role of the microprocessor in this system and how it is used
to update the stock when a book is borrowed.
2210/12/M/J/23 – 1 (Circle three devices that are output devices)
0478/12/F/M/23 – 6 c (Explain how the sensor and the microprocessor
are used to automate this robot)
2210/13/O/N/22 – 6 a (Describe how the QR code is read and processed
to display the video for the visitor.),
2210/13/O/N/22 – 6 d (Describe how the LED screen operates to display
the video)
2210/13/O/N/22 – 4 a (
The company needs to decide which touch screen technology to use.
State one type of touch screen technology that you recommend the
company use. Justify your choice.),
2210/13/O/N/22 – 1 (
Five components are shown. Tick (✓) to show whether each component
is an example of input, output or storage.
)
2210/12/O/N/22 – 1 a (One input device built into the ticket machine is a
touch screen.
(a) Identify two other input devices that could be built into the ticket
machine., The ticket machine has a help icon that a user can touch to
contact customer support.
The ticket machine has an output device that allows the user to hear the
customer support person.
Identify an output device that would be used for this purpose, The touch
screen for the ticket machine uses resistive technology.
(i) Describe how resistive touch screen technology operates to recognise
a user’s touch., Give two benefits of using resistive touch screen
technology for the ticket machine., Give two drawbacks of using
resistive touch screen technology for the ticket machine., Identify one
other touch screen technology that could have been used.,
2210/12/O/N/22 – 2 a (Explain how the water tap system uses a sensor
and a microprocessor to operate.), 2b (Three descriptions are shown of
different systems.
Identify the most suitable sensor that could be used in each system.))
2210/12/O/N/21 – 2 (Identify one other output device that is used in the
ticket machine system., Identify one other input device that would be
suitable for use in the ticket machine system, to allow users to enter their
data)
2210/12/O/N/21 – 4 (Complete the paragraph using the list of terms. Not
all terms in the list need to be used.)
2210/12/O/N/21 – 7 (Tick (✓) to show if each statement applies to a 3D
scanner, barcode reader or a Quick Response (QR) code reader. Some
statements may apply to more than one type of device.)
2210/12/O/N/21 – 8 (Explain how the game uses sensors and a
microprocessor to count the number of times a player hits a correct mat
within 1 second.)
2210/11/M/J/21 – 2 a (names of input devices), 5 (sensor)
2210/12/M/J/21 – 5 a (names of sensor), 5 b (sensor), 8 (F/B on how
keyboard works)
2210/12/M/J/20-6 (Capacitive, Resistive technology tick mark), 8 b
(Benefits of laser printer over inkjet printer, drawbacks)
2210/12/O/N/20-1c-i, 5a (LED display)
2210/13/O/N/20-1 (tick mark for input, output, storage), 8 (LCD display,
Benefits of LCD), 11 (sensor)
2210/11/M/J/19-3 (Names of input and output devices)
2210/12/M/J/19-1 (Names of input devices, output devices), 4b-ii (inkjet
printer), 7a (sensor), 10 (capacitive touch screen)
2210/12/O/N/19-6 (resistive & capacitive touch screen tick mark), 7
(keyboard workings)

2210/13/O/N/19-1a (Names of input devices), 1d (LCD display


workings), 4c (sensor)
2210/11/M/J/18-8 a, b (bar code scanner workings and use), 8c(Infrared
touch screen)
2210/12/M/J/18-2a (how image is converted into digital), 9 (barcode), 10
(capacitive touch screen), 11(sensor)
2210/12/O/N/18-5 (output devices F/B), 10 (sensor)
2210/13/O/N/18-1 (output devices matching), 3 (sensor)
2210/11/M/J/17-9 (input and output devices purpose), 12 (sensor)

2210/12/M/J/17-3 (output device matching), 6 (bar code), 9 (sensor)


2210/12/O/N/17-9 (sensor)
2210/13/O/N/17-1d (sensor names), 6 (2d and 3d scanner workings)
2210/11/M/J/16-3 (matching of sensors, sensor based question), 4b
(application of inkjet, 3d printer, 4c (laser printer), 12a (QR code), 12c
(application of QR code)
2210/12/M/J/16-2 (sensor names), 5 (input device matching), 9a (bar
code in binary)
2210/12/O/N/16- 11b (sensor name and uses)
2210/13/O/N/16-4 (a, b) (benefits and drawbacks of keyboard), 7
(benefits of LED), 9 (sensor)

2210/11/M/J/15-8c (sensor), 8d (sensor), 8 e (Advantages of LED over


CCFL technology)
2210/12/M/J/15-2 (touch screen technology), 3 (input device matching),
7a (sensor), 7b (names of sensor)
2210/12/O/N/15-3 (barcode flowchart), 5a (sensor), 8 (laser printer
working order)
2210/13/O/N/15-1a (Application of different sensors), 1b (flowchart of
sensor), 2a (sensor), 6 (digital camera and scanner), 7 (output device
F/B), 8 (some input device application and reason to use)
0478/12/F/M/17 – 1 (names of sensors), 10 (differences between a
barcode and a Quick Response (QR) code),
0478/12/F/M/18 – 4 (sensor based), 12 a (barcode benefits based on a
scenario), 12 b (how the barcode is read)
0478/12/F/M/19 – 2 a (what is input device, name of input device), 2 b
(what is output device, name of output device), 3 b (name of sensors
based on a scenario, sensor based ), 6 b (laser printer and its benefits and
drawback)

0478/12/F/M/20 – 3 c (identifying input device and output device based


on a scenario), 7 (sensor based)
0478/12/F/M/21 – 3 (Complete the missing device names and
descriptions), 4 a (how the barcode is read at the supermarket checkout
and how the price of the product is found),
2210/12/M/J/24 – 9 (A company uses both solid-state and optical
secondary storage.
(a) Explain why a computer needs secondary storage., Describe three
differences between solid-state and optical storage)
2210/11/M/J/24 – 5 (A computer uses both random access memory
(RAM) and secondary storage.
Chapter 3 Hardware (Data
storage, cloud computing and (a) State the purpose of secondary storage., One type of secondary
virtual memory) storage is optical.
Circle three examples of optical storage., Explain why a computer needs
RAM, The computer processes instructions using the fetch–decode–
execute (FDE) cycle.
Draw and annotate a diagram to show the process of the fetch stage of
the FDE cycle
0478/12/F/M/24 – 2 c (Describe what is meant by RAM., Identify one
other item of data that is commonly stored in ROM., State the purpose of
virtual memory.
2210/13/O/N/23 – 6 (Tick (3) one box to show which is not a
characteristic of cloud storage., Explain two advantages for the owners of
the company of storing its data in cloud storage., Explain one
disadvantage to employees of the company storing data in the cloud.
2210/13/O/N/23 – 9 (Complete the table by writing the type of secondary
storage that applies to each statement.
Some types of secondary storage may apply to more than one statement.,
Explain two differences between primary storage and secondary storage.)
2210/12/O/N/23 – 13 (Tick (3) one box to show which is an example of
primary storage., Give one characteristic of primary storage., Virtual
memory can be created in a computer system.
Complete the description about virtual memory.
Use the terms from the list.
2210/11/M/J/23 – 3 Circle three components that are secondary storage
devices., Tick (3) one box to show which statement about secondary
storage is correct,
0478/13/M/J/23 – 10 A computer has pages A, B and C that are stored in
RAM. Page D needs to be sent to the RAM but the RAM is full.
Page B is not needed immediately.
Explain how virtual memory can be used in this scenario.

2210/12/M/J/23 – 4 b (The photographs are also transmitted across a


network to cloud storage. A device on the network forwards the data
towards its correct destination.), Describe what is meant by cloud
storage., Give one disadvantage of storing the photographs in cloud
storage instead of storing them locally.
2210/12/M/J/23 – 10 b (State which component in the computer would
store both types of software when the power is turned off)
0478/12/F/M/22 – 4 a (Complete the descriptions of the principles of
operation of a mouse and a keyboard using the most appropriate terms
from the list. Not all terms in the list need to be used), 4 b (Identify two
other input devices Pradeep could use with his personal computer), 4 b
(Explain why an LCD projector would be more appropriate for Pradeep)
0478/12/F/M/22 – 6 (Describe how the motion sensor and
microprocessor work together to control the CCTV system.)
0478/12/F/M/23 – 3 b (Random access memory (RAM) is an example of
primary storage.
Give three examples of data that is commonly stored in RAM), 3 c
(Describe the purpose of secondary storage.)
0478/12/F/M/23 – 4 c (Complete the description of solid-state storage.
Use the terms from the list.
Some of the terms in the list will not be used. You should only use a
term once.)
2210/13/O/N/22 – 4 b (The mobile phone uses Random Access Memory
(RAM) and Read Only Memory (ROM).
RAM and ROM are both examples of the same type of storage.
Identify this type of storage and justify your answer.)
9608/12/O/N/21 – 1 (A computer has Random Access Memory (RAM)
and Read Only Memory (ROM).
Tick (✓) one or more boxes in each row to identify whether each
statement refers to RAM, ROM or both.)

2210/12/O/N/22 – 3 (Tick (✓) to show which statements apply to each


component. Some statements may apply to more than one component.),
2210/12/M/J/22 – 7 (Identify three examples of optical data storage), Six
statements are given about the operation of three different types of
storage.
Tick (3) to show which statements apply to each type of storage. Some
statements may apply to more than one type of storage.,
2210/11/M/J/21 – 2 b (tick mark for HDD, SSD, USB flash memory),
2210/12/M/J/21 – 2 a (tick mark for magnetic, solid state, optical), 2 b
(magnetic example, optical example, which storage would be better for a
server), 2 c (the operation of USB flash memory and how it stores data)

2210/12/M/J/20- 9 a (HDD, SSD tick marks), 9 b (Names of optical


storage)
2210/12/O/N/20- 3b (SSD and how it operates), 3c (tick mark of Blu-ray,
CD, DVD)
2210/13/O/N/20-9 (similarities and differences between CD and DVD)
2210/11/M/J/19-6b (why HDD over SSD), 6c (examples of optical
storage)
2210/12/M/J/19-2 (off-line storage, example of primary storage,
secondary storage), 4a (differences between DVD and Blu-ray), 4b(i)
(math problem for image), 7b (ROM)
2210/12/O/N/19-11 a (use of RAM, ROM, SSD in mobile), 11 b (why
SSD rather HDD in mobile?)
2210/13/O/N/19- 1a(ii) (names of storage device)

2210/11/M/J/18-8d (off-line and secondary storage discussion)


2210/12/O/N/18-2 (RAM and ROM tick mark, off-line storage
discussion)
2210/13/O/N/18-9 (differences between RAM and ROM), 13
(Justification of use of storage device)
2210/11/M/J/17-8 (F/B for storage devices),
2210/12/M/J/17-2 (examples of primary, secondary and off-line storage)
2210/12/O/N/17-2 (identify whether primary, secondary or off-line
storage), 8 (math problem, RAM, difference between RAM and ROM)

2210/13/O/N/17-9 a (how data is read from CD), 9 b (math problem), 9 c


(difference between primary and storage device)
2210/11/M/J/16-11 a (tick mark for DVD-RW, DVD-RAM, CD-ROM,
Blu-ray disk), 9 b (why SSD is better than HDD), 9 c (why HDD is still
used)
2210/12/M/J/16-10 (names of storage devices based on description)
2210/11/M/J/15-5 (name of storage device and category of storage
device)
2210/12/O/N/15 - 9 a (purpose of RAM, ROM, SSD based on a
scenario), 9 b (name of a suitable input device), 9 c (why SSD)
2210/13/O/N/15-5 a (name and description of a suitable storage device),
5 b (math problem) , 9 a (math problem),

0478/12/F/M/17 - 13 a (primary, secondary and off-line storage. Give an


example of each.), 13 b (math problem)
0478/12/F/M/18 - 6 (example of primary, secondary, off-line storage
and use for each), 9 (math problem),
0478/12/F/M/19 –6 c (tick mark for primary, secondary, off-line), 6 cii
(how magnetic storage device stores data) 6 ciii (advantages of magnetic
over SSD)
0478/12/F/M/20 – 3 a i (similarity between HDD, SSD), 3 a ii
(differences between HDD, SSD), 3 b (name of off-line storage)
0478/12/F/M/21 –4 b (how an SSD stores data, why SSD rather than
HDD)
0478/12/F/M/22 – 4 c (Identify and justify an appropriate storage device
to store the copies)
9618/12/M/J/21 –5 c i (Give two benefits of storing data using cloud
computing.), 5 cii (Give two drawbacks of Seth using cloud computing ),
2210/12/M/J/24 – 7 (A computer has both a media access control (MAC)
address and an internet protocol (IP) address.
(a) Tick (3) one box to show which of the statements is correct about the
MAC address, An IP address can have an IPv4 or IPv6 format.
(i) Give an example of an IP address that has an IPv4 format., Give two
characteristics of the IPv6 format.)
2210/13/O/N/23 – 8 (Draw and annotate a diagram to represent the role
of a router.)
2210/11/M/J/23 – 6 (Identify the component in the computer that is
needed to access a network., Identify the type of address that is allocated
to the component by the manufacturer,
which is used to uniquely identify the device., Identify the device on the
network that can connect multiple devices and automatically
assign them an IP address., Describe what is meant by a dynamic IP
address.)
0478/13/M/J/23 – 3 (Five network terms or definitions are given in the
table.
Complete the table by giving the missing term or definition.)
0478/13/M/J/23 – 9 (A device can be given an internet protocol (IP)
address. This can be an IPv4 or IPv6.
(a) Give one similarity between IPv4 and IPv6.), Describe two
differences between IPv4 and IPv6
Chapter 3 Hardware (Network 2210/12/M/J/23 – 8 (a) Tick (3) one box to show which device would
hardware) assign the IPv4 address to the computer, 8 b (Describe the characteristics
of an IPv4 address.),
2210/13/O/N/22 – 8 a (A computer can have both a Media Access
Control (MAC) address and an Internet Protocol (IP)
address.
(a) Give two similarities between a MAC address and an IP address.), 8
b (Give two differences between a MAC address and an IP address.)
2210/11/M/J/21 – 1 b (similarities and differences between IP and
MAC),
2210/12/O/N/20- 5 b (F/B on IP address and MAC address)
2210/13/O/N/17-3 b ((b) Describe what is meant by an Internet Protocol
(IP) address)
2210/11/M/J/16-2 a (what is MAC), 2 b (what MAC address represents),
2210/13/O/N/16-10c (State what is meant by these two terms. MAC
address and an IP address)
0478/12/F/M/22 –5 b (Uniform Resource Locator (URL), Internet
Protocol (IP) and Media Access Control (MAC) are three types of
address used by computers when accessing the Internet. Give two
features of each type of address in the table.)
0478/12/F/M/21-, 2 b (matching of IP, MAC, URL)

2210/12/M/J/24 – 4 (A student uses both system software and application


software on their computer.
(a) Give one example of system software., Give two examples of
application software., Describe the difference between system software
and application software.)
2210/11/M/J/24 – 6 (A computer needs firmware and system software to
operate.
(a) State the purpose of firmware., Give one example of firmware., Give
two examples of system software.)
0478/12/F/M/24 – 3 (Complete the table by writing each missing OS
function name and description. – memory management, platform for
Chapter 4 (Software)
running applications, managing peripherals), State the purpose of an
interrupt., Identify one input device and one example of an interrupt that
it can generate., Explain how the processor manages the current program
and the interrupt.)
2210/13/O/N/23 – 1 d (The mobile telephone has an operating system.
Describe the purpose of the operating system.)
2210/11/M/J/23 – 4 Complete the statements about different types of
software.
Use the terms from the list.
2210/11/M/J/23 – 7 A programmer uses a low‑level language to write a
computer program for a vending machine.
(a) Describe what is meant by a low‑level language.
(b) Give two reasons why the programmer would choose to write the
computer program in a low‑level language instead of a high‑level
language.
0478/13/M/J/23 – 4 (Tick (3) one box to show which statement is a
benefit of writing a program in a high-level language, instead of a low-
level language.), Translators are used to translate the high-level language
so that it can be processed by the computer.
0478/13/M/J/23 – 11 (State the name of the software that can do these
tasks., Give one task that the software allows the user to do to manage
files., Describe what is meant by managing memory. A signal is sent
within the computer to allow multitasking to occur. State the name of
this type of signal
2210/12/M/J/23 – 5 a (A programmer writes a computer program using a
high‑level language.), The programmer uses a compiler to translate the
computer program.
(b) Describe how the compiler translates the computer program.,
Describe how the compiler reports errors., Describe how the compiler
reports errors. (c) One function of the IDE is that it has the built‑in
compiler. Give three other common functions of an IDE.
2210/12/M/J/23 – 10 a (Describe the difference between system software
and application software.
Give an example of each software in your answer.),
0478/12/F/M/23 – 2 a (Tick (✓) one box to identify whether the
programmer should use a high-level language or a
low-level language to develop the program.
Explain the reasons for your choice.), 2 b (If the programmer chooses a
high-level language, they can use a compiler or an interpreter to
translate the high-level language into a low-level language.
Describe the operation of a compiler and of an interpreter.),
2210/13/O/N/22 – 4 d (Describe how the interrupt signal is processed to
inform the user that a person is calling them.)
2210/12/O/N/22 – 1 e (State three other functions of the operating
system.)

2210/12/M/J/22 – 4 a (Describe what is meant by a high-level language.,


)
2210/12/O/N/21 – 6 ((a) Give one similarity between a compiler and an
interpreter., (b) Describe two differences between a compiler and an
interpreter, (c) Identify one other type of translator)
2210/12/O/N/21 – 9 ((a) Give three other examples of when an interrupt
signal could be generated., (b) State what would happen if interrupt
signals were not used in a computer.)
2210/12/M/J/20-2 a (why a programmer would make use of both an
interpreter and a compiler), 2 b (why in high-level language)
2210/11/M/J/19-7 (F/B with some terms)
2210/13/O/N/19-2 a (tick mark about HLL), 2 b (tick to select HLL)
2210/13/O/N/19-7 b (interrupt tick mark)

2210/11/M/J/18-7( how a compiler and an interpreter translates a


computer program)
2210/12/O/N/18-6 a (types of translator), 6 b (why HLL), 6 c (selection
of HLL, Assembly, Machine code),
8 (purpose of interrupt)
2210/13/O/N/18-7 a (features of interpreter), 7 b (benefits of compiling
program)
2210/11/M/J/17-2 a (what is HLL), 2 b (name of translator), 2 c (how
translates the program)
2210/11/M/J/17-11 (functions of OS)
2210/13/O/N/17-10 (tick mark of assembly language)
2210/12/M/J/16-1 (F/B)

2210/12/O/N/16-1 a (why LLL), 1 b (tick mark for compiler and


interpreter)
2210/13/O/N/16-6 (advantages of HLL, LLL), 8 (matching for compiler
and interpreter)
2210/11/M/J/15-10 (tick mark for interpreter and compiler)
2210/12/M/J/15-9 a (tick mark for interpreter and compiler), 9 b (why
compiler/interpreter needed), 9 c (benefit of HLL), 9 d (benefit of LLL),
9 e (identification of HLL, machine, assembly code)
0478/12/F/M/17 – 11 (which type of translator)
0478/12/F/M/17 – 6 (matching of functions of OS)
0478/12/F/M/19 – 4 a (why HLL), 4 b (tick mark for compiler and
interpreter)
0478/12/F/M/20 - (tick mark for compiler, interpreter, assembler)

0478/12/F/M/21 – 7 a (what is HLL), 7 b (features of interpreter and


compiler)
0478/12/F/M/22 – 7 a (Explain when it is most appropriate for Ishani to
use an interpreter, Explain when it is most appropriate for Ishani to use a
compiler)
2210/12/M/J/24 – 8 (A company has a website that is suffering a
distributed denial of service (DDoS) attack.
(a) Draw and annotate a diagram to show the process of the DDoS,
Identify a solution that can be used to help prevent the DDoS attack
being successful.
2210/11/M/J/24 – 9 c (The company owner also installs a firewall to help
protect the network from hackers and
malware.
(i) Explain how the firewall operates to help protect the network., Give
two examples of malware that the firewall can help protect the network
from.)
0478/12/F/M/24 – 4 (A student enters a uniform resource locator (URL)
into their web browser.
Draw and annotate a diagram to show the process from the user entering
the URL to the web browser displaying the web page.)

2210/13/O/N/23 – 4 a, b, c (Describe the main purpose of a web browser,


Identify the function of a web browser that could be used for this
purpose, identify the function of a web browser that could be used for
this purpose.,

Chapter 5 (The internet and its 2210/12/O/N/23 – 9 (Complete the table with the missing terms and
uses) descriptions.),
2210/11/M/J/23 –10 c (Explain the purpose of the web browser., Storing
cookies is one function of the web browser.
Give three other functions of the web browser., A student visits a website
that uses session cookies, instead of persistent cookies.
Explain the difference between session cookies and persistent cookies.
0478/13/M/J/23 – 9 c (Identify the system that stores a database of
uniform resource locators (URLs) and their corresponding IP addresses.,
Identify the software that sends a request to the IP address to obtain the
web page data)
2210/12/M/J/23 – 6 a (Complete the statements about cookies.
Use the terms from the list), 6 b (Give three functions of a cookie.)
0478/12/F/M/23 – 5 d (Identify two other functions of a web browser.),
(Identify two ways that cookies can be used to enhance the user’s
experience of this website.)
2210/12/M/J/22 – 3 a (Complete the table by writing each missing term
or definition: browser, ISP, HTTP, URL, cookie)
2210/12/M/J/21 – 6 a (how cookies can be used to store and
automatically enter a user’s payment details), 6 b (why a user may be
concerned about their personal data and online browsing habits being
stored in cookies)
2210/11/M/J/21 - 7 b (how the web pages for the website are requested
and displayed on a user’s computer),
2210/12/M/J/20-5 a (web browser)
2210/12/O/N/20-5c (role of browser)
2210/13/O/N/20-4 a (Describe how the webpages are requested and
displayed on the customer’s computer),
2210/13/O/N/20-12 (tick mark for ISP)
2210/12/M/J/19- 6b (cookies), 6d (URL)
2210/12/O/N/19-7b (function of a browser), 7c (what is https),
2210/11/M/J/18- 10 b (identifying parts of URL, https), 10c (cookies)
2210/13/O/N/18-8 a (URL), 8 b (how the web browser uses the URL to
access the webpage)
2210/12/M/J/17-11 (how the information stored on the company’s
website is requested by the customer, sent to the customer’s computer
and displayed on the screen)
2210/12/O/N/17-5 (cookies)
2210/13/O/N/17-3 a (part of URL)
2210/12/O/N/16-10 a (what is meant by HTML), 10 b (parts of URL)
2210/11/M/J/15-4 (URL fill in the blanks)
2210/12/M/J/15-1 a (cookies)
2210/12/O/N/15-6 a (HTML), 6 c (functions of a browser)
0478/12/F/M/20 –8 a (how the browser access a web page)
0478/12/F/M/21- 2 b (URL)
0478/12/F/M/17 – 5 (Give the meaning of the following terms – HTML,
http, https)
0478/12/F/M/22 –5 b (Uniform Resource Locator (URL), Internet
Protocol (IP) and Media Access Control (MAC) are three types of
address used by computers when accessing the Internet. Give two
features of each type of address in the table.)

0478/12/F/M/24 – 5 (Complete the description of digital currencies using


the terms provided.)

Chapter 5 (Digital currency) 2210/12/O/N/23 – 12 (Digital currencies are often tracked using digital
ledgers.
(Give two other features of digital currency., Identify the process that
uses a digital ledger to track the use of digital currency)

2210/12/M/J/24 – 11 (A company has a website. Users use the internet


and the world wide web to access the website.
Chapter 5 (Cyber security)
(a) Describe the difference between the internet and the world wide web.,
The website has a uniform resource locator (URL). The URL has three
different parts.
Identify the three different parts that are included in the URL., One
function of a web browser is to provide an address bar for a user to enter
a URL.
Give three other functions of a web browser.)
2210/13/O/N/23 – 4 d (State how the SSL protocol secures the data for
transmission.)
2210/12/O/N/23 – 1 (Tick (3) one box to show which cyber security
threat is not a type of malware.), Identify one other example of malware
than those given in part 1(a), Identify the type of software that is used to
find and remove malware from a computer.)
2210/12/O/N/23 – 8 (Draw and annotate a diagram that demonstrates the
cyber security threat of data interception., Identify one security solution
that will help keep data safe from data interception and state
why it will help keep the data safe.)
2210/12/M/J/23 – 7 (A distributed denial of service attack (DDoS) is a
cyber-security threat.
(a) Draw and annotate a diagram to represent the process of a DDoS.), 7
b (State two aims of carrying out a DDoS attack), 7 c (Give two security
solutions that can be used to help prevent a DDoS attack being
successful.)
2210/11/M/J/23 – 8 Describe how a brute‑force attack can be used to
gain access to the employee user accounts. State two other aims for
carrying out a brute‑force attack to gain access to the employee
user accounts. Identify three types of malware that could be installed,
Give two security solutions that could be used to help prevent a
brute‑force attack being successful.
2210/11/M/J/23 –10 a, b (State the aim of pharming., Draw and annotate
a diagram to represent the process of pharming.,
0478/13/M/J/23 – 6 a (A student is writing a help guide about how to
recognise and avoid the cyber-security threat of pharming.
(a) Give three appropriate solutions he could include. The student also
wants to include information in the help guide about the use of social
engineering as a cyber-security threat.
Describe what is meant by social engineering.
Include one example of social engineering in your answer., The student
includes information about the security solution of access levels.
Describe what is meant by access levels.
0478/13/M/J/23 – 8 (Complete the statements about a distributed denial
of service (DDoS) attack. Use the terms from the list.)
0478/12/F/M/23 – 1 a (Computers can be infected with malware.
Spyware is one example of malware.
(a) Tick (✓) one box to show a correct definition of spyware.), 1 b
(Complete the table by identifying and describing two other examples of
malware.), Proxy-servers and firewalls have some similar functions.
Identify two similarities and one difference between proxy-servers and
firewalls.,
2210/13/O/N/22 – 10 a (Describe what is meant by HTTPS), One way a
user can check a website uses HTTPS is to check whether the Uniform
Resource Locator (URL) begins with HTTPS. Give one other way a user
can check if a website uses HTTPS., There is a risk that people that use
the Internet to access websites can have their stored data maliciously
damaged. State three ways that stored data can be maliciously damaged.)
2210/12/O/N/22 – 4 (State two methods she could use to help prevent
accidental loss of data in this way. Describe how each method would
help prevent accidental loss of the data.)
2210/12/O/N/22 – 6 (Give two ways that a user could check that a
website uses the SSL protocol., State the name of the updated version of
the SSL protocol., Jian’s system for his website has a proxy server.
Explain why Jian uses a proxy server as part of the system for his
website.), State the type of malware that could be used to gather a user’s
login details, Give three methods that could be used to help prevent a
user’s login details being
gathered by malware, when they are logging into their account.
Describe how each method can help prevent this happening.), The
paragraph describes how the web pages are obtained and displayed for
the user.
Complete the paragraph using the list of terms. Not all terms in the list
need to be used.
2210/12/M/J/22 – 3 b, c (Tick (3) to show which statement about
firewalls is true., Explain how the firewall is used to limit the websites
that Joelle can access)
2210/12/M/J/22 – 6 (Identify two online security attacks that can be
carried out using email.
Describe how email is used to enable the attack., One security method to
keep data safe from online attacks is a firewall.
Identify two other security methods that keep data safe from online
attacks.), Complete the table by giving three other examples of how data
can be damaged accidentally.
Give a method of prevention for each example
2210/12/O/N/21 – 10 ((a) Explain how the SSL protocol secures the data
for transmission., (b) Identify an alternative protocol that could be used
for secure transmission of data using the internet., (c) Give two ways that
a user can identify if a website uses secure data transmission)
2210/12/O/N/21 – 5 (Identify three other methods Sammi could use to
prevent his customers’ confidential data being viewed.)
2210/11/M/J/21 – 3 a (F/B for firewall), 3 b (methods names to keep data
secure), 4 (phishing, pharming), 7 c (DOS attack)

2210/12/M/J/21 – 4 a (tick mark for virus, spyware, DOS), 4 b (3 other


types of security risk), 4 c (accidental damage),
2210/12/M/J/20-3 b (Security methods), 5 b (Handshake layer, TLS), 10
a (Similarity and differences between phishing and pharming), 10 b
(other security risks), 10 c (firewall)
2210/12/O/N/20-1d (TLS), 1e (Security risk, proxy server), 3a
(Accidental damage)
2210/13/O/N/20-4 a (Describe how the webpages are requested and
displayed on the customer’s computer), 4 b (names of security threat, 6
(fill in the blanks), 13(Similarities and differences of phishing and
pharming)

2210/11/M/J/19-4 (security risk), 6a (security improvement), 8 (SSL,


firewall)
2210/12/M/J/19-5 (security measure), 6e (DOS)
2210/12/O/N/19-10b (Security measures)
2210/13/O/N/19-6 (software), 8 (malware)
2210/11/M/J/18- 10 d (proxy server)
2210/12/M/J/18-12a (Security method)

2210/12/O/N/18-4 (security risk, firewall)


2210/13/O/N/18-6 (security method)
2210/11/M/J/17-7 (matching)
2210/12/M/J/17-8 (SSL, firewall, security methods)
2210/12/O/N/17 - 10 (TLS)
2210/13/O/N/17-7 (tick mark, firewall), 8 (Accidentally damage, SSL)
2210/11/M/J/16-6 (secure website), 8 (Explain why it is more secure to
use drop-down boxes rather than entering characters using a keyboard.,
Give a reason why the system asks for four characters chosen at random,
Give two examples of biometrics), 10 (security threat matching)

2210/12/M/J/16-8 c, d (malware, firewall)


2210/12/O/N/16- 9 (security threats)
2210/13/O/N/16-2 (security issues fill in the blanks), 4c (security
methods), 10d (Layers of TLS)
2210/11/M/J/15-4 (firewall, proxy server), 6 (security)
2210/12/M/J/15-1 b (security matching), 4 (SSL)
2210/12/O/N/15-1 (security)
0478/12/F/M/17 –9 (difference between text based password and
biometric password)
0478/12/F/M/18 –2 a (tasks carried out by anti-virus software), 2 b
(reducing the risk of virus)
0478/12/F/M/19 – 7 (identify and describe risks using internet)

0478/12/F/M/20 - 2 d (prevention of loss of data), 8 a (how a browser to


access the web pages), 8 b (DOS attack)
0478/12/F/M/21 – 2 c (benefits of SSL, how the SSL connection is
created), 6 a (how firewall can prevent hacking), 6 b (internal risk to
prevent data)
0478/12/F/M/22 – 5 c (Complete the table by identifying:
• two potential threats to its web server
• the impact each threat could have on the company
• software the company can use to help to limit each threat.)
2210/12/M/J/24 – 10 (A garage uses an expert system to help diagnose
any problems with cars that need repair.
(a) The expert system is an example of artificial intelligence (AI).
Describe what is meant by AI., A car has a problem with its braking
system, so it is brought into the garage.
Explain how the expert system operates and how it is used to help
diagnose the problem.)
2210/11/M/J/24 - A farmer uses an automated robot to plant seeds in the
field.
Chapter 6 (Automated and (a) State what is meant by the robot being automated, Give three
emerging technologies) characteristics of a robot., The robot plants seeds and stops when it
reaches a fence. It then turns and continues planting
seeds. The robot uses sensors and a microprocessor to know when it
reaches a fence.
Explain how the robot uses sensors and a microprocessor to know it has
reached a fence., Give two advantages of the farmer using an automated
robot to plant seeds, Give two disadvantages of the farmer using an
automated robot to plant seeds., The robot is adapted to have machine
learning capabilities.
Explain how this will improve the robot.
0478/12/F/M/24 – 6 a (Give one other reason why the self-driving tractor
is an example of a robot,), 6 b, c (Explain how an infra-red sensor,
microprocessor and actuator can be used to stop the self-driving tractor if
a person is detected within 3 metres., Identify one other sensor that the
self-driving tractor might use and how it will use the sensor., Explain the
drawbacks of a farmer using a self-driving tractor to sow seeds and
harvest crops., 6 d (The self-driving tractor has an in-built expert system
that the farmer can use to solve any errors with the tractor. Identify three
components of an expert system.,
2210/12/O/N/23 – 10 (State one of the main characteristics of an AI
system., An AI system is an expert system.
Explain how an expert system operates.)
2210/12/O/N/23 – 11 (The automated system uses a flow sensor.
Identify what a flow sensor measures., Explain one advantage to
employees of using an automated system in manufacturing., Explain one
disadvantage to the company owner of using an automated system in
manufacturing.)
2210/13/O/N/23 – 10 (Complete the description about the operation of
the expert system.
Use the terms from the list. Some of the terms in the list will not be
used., Describe what is meant by machine learning capabilities.)

2210/11/M/J/23 – 5 (A farm has an automated drinking system for its


animals. The drinking system has a water bowl
that contains the water. When the water bowl is empty, it is automatically
refilled.
The system uses a sensor and a microprocessor.
(a) Identify the most appropriate sensor for this system., Describe how
the sensor and the microprocessor are used to automatically refill the
water bowl.
(b) Describe how the sensor and the microprocessor are used to
automatically refill the water bowl.
2210/11/M/J/23 – 9 A company uses robots in its factory to manufacture
large pieces of furniture.
(a) One characteristic of a robot is that it is programmable.
State two other characteristics of a robot., Give two advantages to
company employees of using robots to manufacture large pieces of
furniture., Give one disadvantage to the company’s owners of using
robots to manufacture large pieces of furniture.

2210/12/M/J/23 – 9 (One component of an expert system is the inference


engine.
(a) Identify the three other components in an expert system., 9 b
(Describe the role of the inference engine in an expert system)
0478/13/M/J/23 – 7 The rule base and the inference engine are two
components of an expert system.
(a) Identify the other two components of an expert system, Describe the
role of the rule base in an expert system.
0478/12/F/M/23 – 6 b (Describe what is meant by robotics)
0478/12/F/M/23 – 6 d I (Describe the characteristics of AI), Explain how
the program will use AI

PAPER 2 (Chapter 7 – 10) - Algorithms, programming and logic

Topic Subject code/Variant/Session/Year/Q. No.

2210/22/M/J/24 – 7 (Give a line number for each of these types of statement:


Assignment statement
..............................................................................................................
Selection statement
..................................................................................................................
Iteration statement .., Identify the line numbers of the three errors in the
pseudocode and suggest a correction for
each error.)
2210/21/M/J/24 – 4 (This pseudocode algorithm is intended to allow, at
random, between 1 and 20 values to be entered
and totalled. The total and average of the entered values are output at the end of
the algorithm., Identify the line numbers of four errors in the pseudocode and
suggest corrections., Write the pseudocode statement that would output the
average calculated in line 13 of the
Error detection and algorithm rounded to one decimal place., Explain how you should alter the
correction original corrected algorithm to make sure that all the
numbers entered are between 1 and 500 inclusive. If any numbers fall outside
these limits, a
replacement value is requested and entered.
You do not need to re-write the algorithm.)
0478/22/F/M/24 – 5 a (An algorithm has been written in pseudocode to
calculate the profit when an item is sold. Values for cost price and selling price
are input, the profit is calculated (selling price – cost price) and output. The
input of zero for either value stops the algorithm.,
2210/23/O/N/23 – 5 a (An algorithm has been written in pseudocode to check if
a new password is in a list of previously used passwords OldList[]
If the password is not found, the new password will be stored at the end of the
list to replace
"XXXX" already stored there.) – One-dimensional Array based
2210/22/O/N/23 – 4 a (2D array related), 4 b (Describe the changes you
should make to the corrected algorithm to allow the name of a
country to be input and to display only the stored cities from that country.
You do not need to rewrite the algorithm.)

0478/23/M/J/23 – 6 (Identify the four errors in the pseudocode and suggest


corrections., Describe the changes you should make to the corrected algorithm
so that a count-controlled loop is used to allow 100 positive numbers to be
input. You do not need to rewrite the algorithm.)
2210/21/M/J/23 – 5 a, 5 b(Describe how you could change the corrected
algorithm to record and output how many positive numbers have been included
in the final total. You do not need to rewrite the algorithm)
2210/22/M/J/23 – 7 b (one-dimensional array related, check digit related)
0478/22/F/M/23 – 6 a
2210/22/O/N/22 – 5 a (one-dimensional Array based)
2210/22/M/J/22 – 2 a (Identify the three errors in the pseudocode and suggest a
correction to remove each error.)
2210/22/O/N/21 – 4 a (Find the five errors in the pseudocode and suggest a
correction for each error)

2210/22/M/J/20-3 (One-dimensional array based)


2210/23/O/N/20-2b
2210/22/M/J/19-2
2210/22/O/N/19-2 (function based)
2210/23/O/N/18-4
2210/21/M/J/17-2

2210/22/M/J/17-4a
2210/23/O/N/17-2 (One-dimensional array based)
2210/21/M/J/16-2
2210/22/M/J/16-2
2210/22/O/N/16-2
2210/23/O/N/16-2

2210/21/M/J/15-2
2210/22/M/J/15-2
2210/22/O/N/15-2
2210/23/O/N/15-2
0478/22/F/M/17 – 2
0478/22/F/M/18 – 2 a
0478/22/F/M/19 – 2 a
0478/22/F/M/20 – 2 a
0478/22/F/M/22 – 2 a

2210/22/M/J/24 – 6 (Totalling and counting are standard methods of solution.


Numbers are input. The number 9999.9 is the last number to be input and is
ignored.
(a) Write an algorithm in pseudocode to total the numbers input and to output
the total.
You do not need to validate the input., Write an algorithm in pseudocode to
count and output the number of input values that are
greater than 100. You do not need to validate the input.)
2210/21/M/J/24 – 5 (Write the pseudocode statements to perform this task:
• accept the input of a whole number from 1 to 4 inclusive
• use a CASE statement to:
○ output the number (1 to 4 inclusive) that was entered
○ output the word “ERROR” if a 1 to 4 inclusive number was not entered.)
Pseudocode 2210/22/M/J/23 – 7 b ii
2210/22/M/J/23 – 7 c

0478/22/F/M/23 – 6 b (Write pseudocode to check for an efficiency of 92% or


over for this appliance and to output
“A-rated” if the efficiency is 92% or over.)
0478/22/F/M/23- 10 a (Write pseudocode statements to declare the variables X,
Y and Z),
2210/23/O/N/22 – 2 (Complete the pseudocode algorithm, 1D Array related)
2210/22/O/N/22 – 5 b (Write the new pseudocode statements that would be
needed to achieve this and state where in the algorithm they would be placed.)
2210/22/O/N/21 – 4 b (Write the pseudocode to perform this task and state
where in the algorithm it would be located.)
2210/21/M/J/21 – 4 b (array based, Write the pseudocode to output the contents
of the arrays Score[] and Grade[] along with suitable messages.)
2210/22/M/J/21 – 2 a (Write an algorithm in pseudocode to input 500 positive
whole numbers. Each number input must be less than 1000. Find and output the
largest number input, the smallest number input and the range (difference
between the largest number and smallest number)), 2 b (how testing can be
made less time consuming), 5 a (array), 5 b (why a particular loop is used)

2210/21/M/J/20-4 b (array based, Re-write the original pseudocode so that it


terminates correctly and also prevents numbers below 100 from being stored in
the array Values[ ])
2210/22/O/N/20 – 4 (array based, Extend and re-write the algorithm using
pseudocode to also count and output how many of the numbers stored in the
array are greater than 500, using the variable Higher. Only output Higher once
with an appropriate message.)
2210/21/M/J/19-3a (example pseudocode for conditional statement)
2210/22/M/J/19-2b (Show how you would change the corrected algorithm to
total the numbers and print the total. Use a variable Total.)
2210/23/O/N/19 – 4 (Name the type of statement demonstrated by the use of IF
… THEN … ELSE … ENDIF), 4 b (Re-write the pseudocode algorithm using
a CASE statement)
2210/21/M/J/18-2a (input 1000 numbers. Count how many numbers are
positive and how many numbers are zero)
2210/22/M/J/18-3b (Show how you could improve the algorithm written in
pseudocode by writing an alternative type of conditional statement in
pseudocode)

2210/22/O/N/18-2a (input three different numbers, multiply the two


larger numbers together and output the result)
2210/21/M/J/17-5c (input a number between 0 and 100 inclusive. The
algorithm should prompt for the input and output an error message if the
number is outside this range)
2210/22/M/J/17-2a (Write an algorithm to input three different numbers, and
then output the largest number. Use either pseudocode or a flowchart.), 4b
(Rewrite the correct algorithm using a more suitable loop structure)
2210/22/O/N/17-2 (input a positive integer, use this value to set up how many
other numbers are to be input, input these numbers, calculate and output the
total and the average of these numbers)
2210/23/O/N/17-4b (array based, Write an algorithm in pseudocode, using a
single loop, to print 50 names that have been stored in an array)
2210/22/M/J/15-5 a (array based, Write an algorithm, using pseudocode and a
FOR … TO … NEXT loop structure, to input 1000 numbers into an array), 5 b
(Rewrite your algorithm using another loop structure)
0478/22/F/M/17 – 5 a (array based, Rewrite the following pseudocode
algorithm using a WHILE … DO … ENDWHILE loop)

0478/22/F/M/18 – 2 b (Rewrite the following pseudocode algorithm using a


WHILE … DO … ENDWHILE loop)
0478/22/F/M/19 – 2 b (Show how you would change the corrected algorithm to
only total numbers greater than 0 and less than 20.)
0478/22/F/M/22 – 2 b (Write the extra pseudocode statements that are needed
to count and output the number of students under the age of 7. Use the variable
CountUnder7; assume CountUnder7 has already been set to zero.)

2210/23/O/N/23 – 5 b (Complete this flowchart for the corrected algorithm:) –


Array based
2210/21/M/J/19-4d (Draw a flowchart to represent this section of program
code)

Flowchart 2210/22/M/J/18-2 (Draw a flowchart for an algorithm to input numbers. Reject


any numbers that are negative and count how many numbers are positive. When
the number zero is input, the process ends and the count of positive numbers is
output.)

2210/22/M/J/17 – 2 a (Write an algorithm to input three different numbers, and


then output the largest number. Use either pseudocode or a flowchart.)

2210/22/M/J/24 - Complete the trace table using the data given in the array. 1D
array related, Bubble sort, Describe what the algorithm represented by the
flowchart is doing.
2210/21/M/J/24 – 6 (Complete the trace table for the input data:, (1D array
related, Bubble sort + median), Outline the processes involved in the algorithm
shown in the flowchart on page 6.)
0478/22/F/M/24 – 8 (This flowchart represents an algorithm to find the average
size of groups of visitors to an attraction.)
2210/23/O/N/23 – 8 a (This is an algorithm to find if a batch of parts has been
Trace table manufactured successfully), 8 b (Describe how the algorithm should be
changed to accept ‘Y’ or ‘y’ for a successfully manufactured part.)
2210/22/O/N/23 – 6 a (The flowchart represents an algorithm that performs a
process on groups of values that are input.
The algorithm will fail if the first value of any group is 0.
An input of –1 will terminate the algorithm.), 6 b (Describe the purpose of the
algorithm.)
0478/23/M/J/23 – 7 a (Complete the trace table for the input data), Describe the
purpose of the algorithm.
2210/21/M/J/23 – 7 a (Complete the trace table for the algorithm by using the
input data: F, Y, D, N), Identify the type of algorithm used, Describe one
problem that could occur with this algorithm if an invalid character was input.)

2210/22/M/J/23 – 9 (1D array related) (Bubble sort in ascending order)


0478/22/F/M/23 – 8 a, 8 b (Identify the error in the algorithm and describe how
to correct it.)
2210/23/O/N/22 – 4 a
2210/22/O/N/22 – 6
2210/22/M/J/22 – 4 a (trace table), 4 b (State how the final output from the
algorithm could be improved.), 4 c (Identify the process in the algorithm that is
not required)
2210/22/O/N/21 – 5
2210/21/M/J/21 – 5 a , 5 b (Test data related), purpose of the algorithm)

2210/22/M/J/21 – 4 a, 4 b (explain how 3 attempts can be implemented)


2210/21/M/J/20-5a, 5 b (purpose of the algorithm)
2210/22/M/J/20-4
2210/22/O/N/20-5 (1D array based, bubble sort efficient one)
2210/23/O/N/20-4 a, 4 b (purpose of the algorithm)
2210/21/M/J/19-4c

2210/22/M/J/19-3
2210/22/O/N/19-3
2210/23/O/N/19-5 (1D array based, binary search)
2210/21/M/J/18-3 (1D Array based, check digit related array)
2210/22/M/J/18-3a
2210/22/O/N/18-5 (multiple inputs)

2210/23/O/N/18-5 (from pseudocode)


2210/22/M/J/17-3
2210/21/M/J/17-6
2210/22/O/N/17-5

2210/23/O/N/17-5 (1D array based, bubble sort efficient one)


2210/21/M/J/16-4
2210/22/M/J/16-3
2210/22/O/N/16-3 (Conversion)
2210/23/O/N/16-3
2210/21/M/J/15-3
2210/22/M/J/15-3 (check digit calculation)
2210/22/O/N/15-3
2210/23/O/N/15-3 (Conversion)
0478/22/F/M/17 - 4
0478/22/F/M/18 - 3
0478/22/F/M/19 - 3

0478/22/F/M/20 – 3 a, 3 b (follow up question)


0478/22/F/M/21 – 4 a, 4 b (follow up question)
0478/22/F/M/22 – 4 a (trace table), 4 b, 4 c (to count the factors of a number)

2210/23/O/N/22 - 5
2210/22/O/N/22 – 7
2210/22/M/J/22 – 5

2210/22/O/N/21 – 6
Database (old syllabus) 2210/21/M/J/21 – 6
2210/22/M/J/21 – 6 (identifying error and rewrite the correct QBE)
2210/21/M/J/20-6
2210/22/M/J/20-6
2210/22/O/N/20-7
2210/23/O/N/20-5
2210/21/M/J/19-5
2210/22/M/J/19-6

2210/22/O/N/19-7
2210/23/O/N/19-7
2210/21/M/J/18-6
2210/22/O/N/18-6
2210/23/O/N/18-6
2210/22/M/J/17-5
2210/21/M/J/17-7
2210/22/O/N/17-6
2210/23/O/N/17-6
2210/21/M/J/16-6
2210/22/M/J/16-7
2210/22/O/N/16-5

2210/23/O/N/16-6
2210/21/M/J/15-7
2210/22/M/J/15-6
2210/22/O/N/15-6
2210/23/O/N/15-5
0478/22/F/M/17 - 6
0478/22/F/M/18 – 6 (why data type)

0478/22/F/M/19 - 6
0478/22/F/M/20 – 5 (why data type)
0478/22/F/M/21 – 5 (why data type)
0478/22/F/M/22 – 5 (Explain why the query-by-example is incorrect and write
a correct query-by-example.)
2210/22/M/J/24 – 10 (Identify the field that will be the most appropriate
primary key for this table., Complete the table to identify the most appropriate
data type for these fields in Contract, Explain the purpose of these structured
query language (SQL) statements.
Statement 1: SELECT SUM (Months) FROM Contract;
Statement 2: SELECT COUNT (News) FROM Contract WHERE News;
Complete this SQL statement to find the contract numbers of the subscribers
that take both
the news and sports services.)
2210/21/M/J/24 – 9 (A database table called SoftDrinks stores details of the
soft drinks sold by a small shop, State whether any of the given fields would be
suitable as a primary key and give a reason for
your answer., Complete the structured query language (SQL) statement to
return the number of cans the
shop has in stock.)
0478/22/F/M/24 – 9 (A storage unit rental company wants to set up a new
database table for the storage units that can be rented.
Give the name of the field that would be used for the primary key., State the
reason for choosing this field for the primary key., Complete the table to
identify the most appropriate data type for these fields in the table
StorageUnits, Complete this structured query language (SQL) statement to
display only the storage code,
Database (new syllabus) price and size in square metres of all the storage units where there is a hoist
2023 onwards available.
2210/23/O/N/23 - 9 (A sanctuary for pheasants has set up a new database table
called PheasantList to store details
of the different species of bird at the sanctuary. Part of this table is given,
showing: species, description, number of birds at the sanctuary, if the birds are
breeding or not, and number of young born this year
(a) State the number of records and fields in this part of the database table.
Give the name of a field that could be used for the primary key, Explain why
the sanctuary might decide not to use the field in (b)(i) as the primary key, A
new field SpeciesID is added to the database table.
This field contains a six-character code, for example Ph0001.
Give a reason why this field would be a better primary key, Write the output
that would be given by this structured query language (SQL) statement:
SELECT Species, Description
FROM PheasantList
WHERE NumberBirds > 6;
Complete this SQL statement to display all the species of pheasant where the
birds are breeding and there were no young born this year:
2210/22/O/N/23 – 10 (State the number of records in this database table., Give
the name of the field that is most suitable to be the primary key.
State the reason for this choice., Complete the table to show the most
appropriate data type for each field.
Each data type must be different., Complete the structured query language
(SQL) to return the code and breed of all the horses
whose breed originated in Scotland.)
0478/23/M/J/23 – 10 State the number of fields and the number of records in
this database table., Describe the purpose of a primary key., Complete the table
to show the most appropriate data type for each field., Give the output that
would be produced by the structured query language (SQL) statement:)
2210/21/M/J/23 – 10 Give the name of the field that is most suitable to be the
primary key. State the reason for this choice., Complete the table to show the
most appropriate data type for each field.
Each data type must be different., Complete the structured query language
(SQL) query to return the television (TV) code,
screen size and price of all Smart TVs in the database table.)
2210/22/M/J/23 – 10 (Identify the field that will be the most appropriate
primary key for this table., Complete the table to identify the most appropriate
data type for the fields in Songs, Explain the purpose of the structured query
language (SQL) statements,
0478/22/F/M/23 – 9 a (State the number of records in this part of the database
table), Give the name of the field that would be used for the primary key., State
the reason for choosing this field for the primary key., Complete the table to
identify the most appropriate data type for each field based on the data
shown in the table BookList, Write the output from this structured query
language (SQL) statement, Complete this SQL statement to display all the titles
by the author B Penn.

2210/22/M/J/24 – 4 (A program needs to make sure the characters input for a


product code meet these rules:
• The product code is six characters in length.
• The first two characters must be “PD”.
• The last four characters must be a number in the range 1000 to 9999 inclusive.
(a) Identify three validation checks and state how each check would make sure
the product code
met one of these rules.), The program design will include a pseudocode
algorithm. Assume that the product code is
stored in the variable Product
(i) Write the pseudocode to make sure that the product code is six characters in
length., Write the pseudocode to make sure that the first two characters of the
product code are
“PD”.)
Validation and 2210/21/M/J/24 – 1 (Tick (ü) one box to complete this sentence.
Verification A validation check to make sure that an email address contains an ‘@’ sign is a)
0478/22/F/M/24 – 5 b (This algorithm needs to be improved with a range
check.
(i) Write pseudocode to reject the input of values less than zero for variables
Cost and Sell)
(ii) Describe two other validation checks that should be included in this
algorithm.

2210/23/O/N/23 – 4 a (Give the names of two validation checks that are


required for this program., 4 b (Complete this pseudocode to perform your two
validation checks, using your answers given
in (a):
OUTPUT "Please enter the number of seats you want to book "
INPUT Seats)
2210/23/O/N/23 – 1 (Tick (3) one box to show which term is an example of a
verification check.)
2210/22/O/N/23 – 1 Tick (✓) one box to complete the sentence.
Verification is used to make sure that a value entered
2210/22/O/N/23 – 2 a (State the type of validation check used), 2 c (Describe
how a length check could be used with the date entered.)
2210/21/M/J/23 – 3 a (Describe what is meant by data validation.)
0478/23/M/J/23 – 4 (Explain why verification checks are used when data is
input., Give two types of verification check and state how each one can be
used.)
0478/23/M/J/23 – 5 (Four descriptions of validation checks are shown.
Draw one line to link each description to the most appropriate check., Write an
algorithm in pseudocode to make sure that an input for the variable Length is
between 15 and 35 inclusive. The code must iterate until a valid input has been
made and the code must include appropriate messages.)
2210/22/M/J/23 – 4 (Describe the validation checks that the programmer would
need to use., State why this check needs to be included, The input value needs
to be stored in the variable Measurement Write pseudocode to perform the
double entry check until a successful input is made.)
2210/22/O/N/22 - 3 (Describe the use of verification on input of data when
entering a list of items in stock into a database. Explain why verification is
necessary.)
2210/23/O/N/22 – 3 (Calculate the check digit for 69321), State which of these
identification numbers have incorrect check digits., Describe an input error that
would not be found using this check digit, Describe a more suitable algorithm
to calculate the check digit for this identification
number.), Identify two other validation checks that could be used when
inputting this identification
number.)
2210/22/M/J/22 – 2 b (The algorithm includes two types of check on the data
input.
Identify and describe each type of check.)
2210/22/O/N/21 – 2 (Tick (3) one box in each row to identify if the statement is
about validation, verification or neither)
2210/21/M/J/21 – 2 (tick mark)
2210/21/M/J/20-3 (Give the names of two different validation checks and state
the purpose of each one, Give the name of one verification check., Describe the
difference between validation and verification)
2210/21/M/J/19-4a (Give a name for this type of validation check.), 4b
(Describe what is happening in this validation check.)
2210/22/M/J/19-5 (Explain what is meant by validation and verification.
Give an example for each one)

2210/22/O/N/19-4 (Draw a line to connect each validation check to the correct


description.)
2210/22/M/J/18-4 (Explain why verification was chosen and describe how the
programmer would verify this data., The programmer has also decided to
validate the email address and the password.
Describe validation checks that could be used)
2210/21/M/J/17-4 (tick mark)
2210/23/O/N/17-3a (Explain the difference between a validation check and a
verification check.), 3b (Describe, using an example, how data could be verified
on data entry)

2210/23/O/N/16-4 (tick mark on validation check type)


0478/22/F/M/17 – 3 (data type and validation)
0478/22/F/M/19 – 5 a (State whether this is called validation or verification,
Name the check that needs to be used.)
0478/22/F/M/20– 4 (why validation and verification checks are needed when
data is input)
0478/22/F/M/22 – 3 (Draw a line from each validation check to the most
appropriate description.)

0478/22/F/M/24 – 2 (Four test data types and five descriptions are shown.
Draw one line to link each test data type to its most appropriate description., An
algorithm has been written to test if an integer that is input is in the range 5 to
10 inclusive.
Identify an example of suitable test data for each test data type.)

2210/23/O/N/23 – 4 c (Give one item of test data to use when testing this
program.
State the reason for your choice of test data.)
2210/22/O/N/23 – 2 b (Give one example of normal test data and one example
Test data of abnormal test data you should
use to make sure the check in part (a) is working properly.
State a reason for each of your choices of test data.),
2210/21/M/J/23 – 3 b (Give one example of each type of test data to check that
the validation check is working as intended. Each example of test data must be
different.
Give a reason for each of your choices of test data.)
0478/22/F/M/23 – 3 (Describe the purpose of test data. Include an example of a
type of test data in your answer.)
2210/22/O/N/22 - 4 Describe one type of test data that must be used to test if a
program accepts valid input data.
2210/22/M/J/22 – 2 c (Give two sets of test data for this algorithm and a reason
for choosing each set.
Each set of test data and its reason must be different.)
2210/22/O/N/21 – 3 (Identify one piece of normal, extreme and erroneous test
data for this program, and give a reason for each.)

2210/22/O/N/20-3 (Identify three different types of test data. For each type,
give an example of the test data you would use to test this algorithm and state a
reason for your choice of test.)
2210/21/M/J/18-4 (A programmer has written a routine to check that prices are
below $10.00. These values are used as test data.
10.00 9.99 ten Explain why each value was chosen.)
2210/22/M/J/18-5 (A program checks that the weight of a basket of fruit is over
1.00 kilograms and under 1.10 kilograms. Weights are recorded to an accuracy
of two decimal places and any weight not in this form has already been
rejected.
2210/22/O/N/18 – 2b (Give two sets of test data to use with your algorithm in
part (a) and explain why you chose each set.)
2210/22/M/J/17-2b (Give two sets of test data to use with your algorithm in
part (a) and explain why you chose each set.)
2210/22/O/N/15-4 (A routine checks the weight of melons to be sold in a
supermarket. Melons weighing under 0.5 kilograms are rejected and melons
weighing over 2 kilograms are also rejected.)
2210/23/O/N/15-4 (A routine checks the age and height of children who are
allowed to enter a play area. The children
must be less than 5 years of age and under 1 metre in height.)
The first set of test data used is age 3 and height 0.82 metres
Provide two additional sets of test data. For each, give

0478/22/F/M/18 – 4 (Give, with reasons, two different values of test data that
could be used for the baby’s weight.
Each reason must be different.)
0478/22/F/M/19 – 5 b (State three different types of test data the programmer
would need to use. Give an example
of each type and the reason that the programmer chose that test data.)
0478/22/F/M/21 – 2 b (State an example for each type of test data needed to test
the input of the number:)

Flowchart symbols 2210/22/M/J/21 – 3 a (flowchart symbol from pseudocode), 3 b (type of


pseudocode statement)
2210/22/M/J/21 – 3 a (flowchart symbol from pseudocode)
2210/22/O/N/20-6 (flowchart symbol)
2210/23/O/N/19-6 (Draw four different flowchart symbols and describe how
they are used in a program flowchart)
2210/22/O/N/23 – 7 (The string operation SUBSTRING(Quote, Start, Number)
returns a string from Quote
beginning at position Start that is Number characters long. The first character in
Quote is in position 1.
Write pseudocode statements to:
• store the string "Learning Never Exhausts The Mind" in Quote
• extract and display the words "The Mind" from the string
• output the original string in lower case.)

0478/23/M/J/23 – 9 (Write the pseudocode statement to declare the variable


Saying), Write the pseudocode statements to:
• allow a string to be input to the variable Saying
• store the content of the variable Saying in a text file named "Quotations.txt"
• make sure the text file is closed at the end of the algorithm.

2210/21/M/J/23 – 8 (The function LENGTH(Phrase)calculates the length of a


String manipulation
string Phrase
(a) Write the pseudocode statements to:
• store the string "The beginning is the most important part" in Phrase
• calculate and output the length of the string
• output the string in upper case.), Write the output your pseudocode should
produce.)
2210/22/M/J/23 – 11 (The variables P and Q are used to store data in a
program. P stores a string. Q stores a character.
(a) Write pseudocode statements to declare the variables P and Q, store "The
world" in P and
store 'W' in Q
(b) Write a pseudocode algorithm to:
• convert P to upper case
• find the position of Q in the string P (the first character in this string is in
position 1)
• store the position of Q in the variable Position
2210/21/M/J/24 – 2 (Four descriptions of programming concepts and five
programming concepts are shown.
(a) Draw one line to link each description to the most appropriate programming
concept.
Not all programming concepts will be used, Write the pseudocode to use a
Subroutine procedure named Average that passes the values 25 and 50
to the procedure.), Outline the role of procedures and functions in creating a
program that is easier to maintain.)

2210/22/O/N/23 – 8 (Explain why a programmer would use procedures and


parameters when writing a program.)
0478/23/M/J/23 – 3 (Describe what happens when a function is called during
the execution of a program.)

0478/22/F/M/23 – 10 b (The function Same(A,B) returns TRUE if the value of


A is the same as the value of B when B
is rounded to the nearest whole number and FALSE otherwise.
Write pseudocode statements to:
• define the function
• call the function with X and Y and store the return value in Z),
State the difference between defining and calling a function
2210/22/O/N/20-2 (sub routine)
2210/23/O/N/20-3 (Matching of validation, verification, procedure, function)
2210/23/O/N/19-2 (Describe the use of a subroutine in a program.),
2210/22/O/N/18-3 (tick mark for routine, structure, procedure, function),
2210/23/O/N/22 – 4 b (Explain how you could extend the algorithm to allow
for the sale of more than one wheelbarrow at a time.)
2210/23/O/N/22 – 2 b (Describe how the algorithm could be changed to output
the number of times each value has been input, starting with the highest value.)
2210/23/O/N/20-2c (extend and explanation of pseudocode)
Explanation 2210/21/M/J/19-3b (purpose of conditional statement)
0478/22/F/M/20 – 2 b (explanation of how you would change the algorithm)
0478/22/F/M/21 – 2 a (Give the line number for the statements showing), 2 c
(description of how to change an algorithm), 3 (pseudocode statement to
connect with flowchart symbol)
0478/22/F/M/24 – 6 (Describe two types of iteration that a programmer can use
whilst writing a program.)
2210/22/M/J/19-4 (For each of the four groups of statements in the table, place
a tick in the correct column to show whether it is an example of Selection or
Repetition.)
2210/23/O/N/19-2 3 (Name the three types of loop structure used in
pseudocode.)
2210/22/O/N/18-4 (Explain, using programming statements, how selection and
Loop repetition could be used in this program.)
2210/23/O/N/18-3 (Give an example of a pseudocode statement or statements
to perform each of the following functions. A condition controlled loop, A
conditional statement, Totalling)
2210/21/M/J/16-5 (REPEAT ... UNTIL is one type of loop structure.
Identify and describe two other types of loop structure that you could use when
writing pseudocode)
2210/21/M/J/15-6 (Identify three different loop structures that you can use
when writing pseudocode)
0478/22/F/M/17 –5 b (difference between WHILE loop and REPEAT loop)
2210/21/M/J/24 – 3 (State what is meant by the data types integer and real.
Give an example of each. Integer, Real)
0478/22/F/M/24 – 4 (Identify three data types used in programming.)
2210/21/M/J/21 – 3 (data type),
2210/22/M/J/20- 2 (data types),
2210/21/M/J/19-2 (data type and description)
Data type
2210/23/O/N/18-2 (Describe, giving an example for each, the following data
types used in programming. Integer, string)
2210/21/M/J/16-3 (Choose a suitable data type for each of the membership
details to be recorded.
2210/21/M/J/15-4 (Draw a line to link each data type to the correct data
sample.),
0478/22/F/M/17 – 3 (data type and validation)
Testing 2210/21/M/J/18- 2 b (how testing could be made more manageable),

0478/22/F/M/23 – 5 (Complete the structure diagram for the given parts of the
food ordering system)
2210/21/M/J/20 – 2 (Structure diagram tick mark)
Structure diagram
2210/21/M/J/17-3 (A satellite navigation system is an example of a computer
system that is made up of sub-systems.
This structure diagram shows some of its sub-systems),

2210/23/O/N/23 – 2 (Tick (3) one box to show which library routine returns the
remainder of a division.)
0478/23/M/J/23 – 2 Explain the purpose of the library routines MOD and
RANDOM
Library routine 2210/21/M/J/23 – 4 (Explain the purpose of the library routines DIV and
ROUND)
2210/23/O/N/17-3c ((c) Explain what is meant by the term library routine)
2210/22/O/N/18-3 (tick mark for library routine, structure, procedure,
function),
0478/22/F/M/24 – 3 a (A linear search and a bubble sort are standard methods
of solution.
Fifty numbers are already stored in the array Values[1:50]
(a) Write an algorithm in pseudocode to input a number, MyNumber, and use a
linear search to test if that number is stored in the array. If the number is found
Array in the array, the position in the
array is output. If the number is not found in the array, “Not found” is output.,
Write an algorithm in pseudocode to sort the array Values[1:50] into ascending
order using a bubble sort.
2210/22/O/N/23 – 3 b (A one‑dimensional (1D) array called Temperatures[]
has 25 elements beginning at index 1. It holds values that range between –20
and 100 inclusive.
Write a pseudocode algorithm using a single loop to find the lowest value in
this array and output the result only once.
You do not need to declare or populate this array.)

2210/21/M/J/23 – 1 Tick (ü) one box to show the name of the data structure
used to store a collection of data of the same data type.
0478/22/F/M/23 – 2 b (Write an algorithm in pseudocode, using a single loop,
to output the average of 50 numbers
that have been stored in the array Number[])
2210/22/M/J/22 – 3 a (Describe a one-dimensional array. Include an example of
an array declaration), Explain how indexing could be used to search for a value
stored in a one-dimensional array)
2210/21/M/J/21 –4 a (description of an algorithm for array), 4 c (explanation of
how any size can be used for the array)
2210/22/M/J/20- 5 (dimension, index)
2210/22/O/N/19 – 6 (Explain why constants, variables and arrays are used in
programming.)
2210/21/M/J/17-5a (Describe the purpose of each statement in this algorithm
(array based)), 5b (Identify, using pseudocode, another loop structure that the
algorithm in part (a) could have used.)
2210/22/O/N/17-3 (Draw a line to connect each data structure to the correct
description: constant, array, table, variable),
2210/21/M/J/16-3 State the data structure that would be most suitable to use
and give a reason for your choice
2210/22/M/J/16-5 (State the data structure that would be most suitable to use
and give the reason for your choice)
2210/23/O/N/19-4a (Name the type of statement demonstrated by the use of IF
… THEN … ELSE … ENDIF
2210/22/O/N/17-4 (Identify and describe another type of conditional statement
that you could use when writing pseudocode. Give a reason why you would use
this type of conditional statement.)
Selection 2210/22/M/J/16-6 (Identify two different selection statements that you can use
when writing pseudocode)
2210/22/O/N/16-4 (Explain, using examples, why you would choose to use
each conditional statement)
2210/22/O/N/15-5 (Identify two different conditional statements that you can
use when writing pseudocode)
2210/23/O/N/23 – 7 (A program uses both local variables and global variables.
Describe two differences between local variables and global variables.)
Variable/Constant
2210/22/O/N/23 – 5 (Explain how variables and constants should be used when
creating and running a program.)
2210/21/M/J/23 – 1 Tick (3) one box to complete the sentence.

0478/22/F/M/23 – 1 (Tick (3) one box to show which word accurately


describes the scope of a variable declared in a procedure.)

0478/22/F/M/23 – 4 (Describe how variables and constants are used in


programming.)

0478/22/F/M/23 – 10 (Write pseudocode statements to declare the variables X,


Y and Z)

2210/22/O/N/19 – 6 (Explain why constants, variables and arrays are used in


programming.)

2210/22/O/N/17-3 (Draw a line to connect each data structure to the correct


description: constant, array, table, variable),

2210/21/M/J/15-5 (Explain the difference between a variable and a constant in


a program.),
2210/22/O/N/23 – 3 a (Four pseudocode statements and five pseudocode uses
are shown.
(a) Draw one line to link each pseudocode statement to the most appropriate
pseudocode use.
Not all pseudocode uses will be required.)

2210/22/M/J/23 – 7 a (Give the line number(s) for the statements showing:)

0478/22/F/M/23 – 2 a (Four descriptions and five pseudocode statements are


shown. Draw one line to link each description to its most appropriate
pseudocode statement. Not all pseudocode statements will be used.),

Pseudocode statement
2210/22/O/N/22 – 2 (Draw a line to connect each programming concept to the
type
most appropriate description.)
2210/22/M/J/21 – 3 b (type of pseudocode statement)
2210/23/O/N/20-2a (identification of assignment, loop, selection, counting
from pseudocode)
2210/22/O/N/19-5 (Explain, including examples of programming statements,
how totalling and counting could be used in this program. Totalling, Counting),
2210/21/M/J/18- 5 (Explain the difference between the programming concepts
of counting and totalling. Include an example of a programming statement for
each concept in your explanation.)
2210/23/O/N/17- 4a (Four pseudocode descriptions and five pseudocode
statements are shown. Draw one line to link each pseudocode description to the
correct pseudocode statement. Not all pseudocode statements will be used.
2210/22/M/J/16-4 (Draw a line to connect each statement type to the correct
example: assignment, iteration, input, output)
2210/22/M/J/15-4 (Draw a line to link each programming concept to the correct
example of programming code. Counting, repetition, selection, totalling)
0478/22/F/M/18 – 5 (difference between sequence and selection)
0478/22/F/M/19 – 4 (tick mark for selection and repetition)
0478/22/F/M/21 – 2 a (Give the line number for the statements showing), 3
(pseudocode statement to connect with flowchart symbol)

2210/22/M/J/24 – 3 (Identify three different tasks in the analysis stage of the


program development life cycle.)
0478/22/F/M/24 – 1 (Tick (✓) one box to show which task is part of the
analysis stage of the program life cycle.)
PDLC 2210/21/M/J/23 – 1 (Draw one line to link each description to its most
appropriate program development life cycle stage.), Identify three of the
component parts after a problem has been decomposed.
2210/22/M/J/23 – 1
2210/22/M/J/23 – 3
0478/22/F/M/24 – 10 (A programmer has written a program that will be
maintained by another programmer.
Explain how the program can be written to make sure it can be easily
maintained by the other
Maintainable program
programmer.),
2210/21/M/J/23 – 6 (State two features that should be included to create a
maintainable program.
Give a reason why each feature should be used.)
IDE 2210/22/M/J/23 - 6
2210/21/M/J/24 – 7 a (Outline why it is useful to store data in a file., The
function LENGTH(X) calculates the length of a string X
Write the pseudocode statements to:
• read the contents of the text file Quotation.txt into an appropriate string
variable that
File handling has been declared
• output the string in upper case and the length of the string.)

2210/23/O/N/23 – 3 a (Draw one line to link each pseudocode description to the


most appropriate pseudocode
keyword. Not all pseudocode keywords will be used.), 3 b (Give two reasons
for storing data in a file.)
2210/22/M/J/23 - 5

2210/22/M/J/24 - A one-player game uses the two-dimensional (2D) array


Grid[] to store the location of a secret (2D array related)
cell to be found by the player in 10 moves. Each row and column has 5 cells.
Start
Grid[1,1]
At the start of the game:
• The program places an ‘X’ in a random cell (not in Grid[1,1]) and empties all
the other
cells in the grid.
• The player starts at the top left of the grid.
• The player has 10 moves.

2210/21/M/J/24 – 10 (The one-dimensional (1D) array Clubs[] is used to store


the names of 12 cricket clubs in a local
sports league.
The two-dimensional (2D) array Statistics[] is used to store, for each cricket
club, the number
15 marks pseudocode of:
question
• matches won
• matches drawn
• matches lost.
The 1D array Points[] is used to store the total number of points each cricket
club has been
awarded.
The position of any cricket club’s data is the same in all three arrays. For
example, the data in
index 2 of Statistics[] and index 2 of Points[] belongs to the cricket club in
index 2 of
Clubs[]
The variable Matches stores the number of matches played by each team. Each
team plays the
same number of matches.
Points are awarded for:
• a win – 12 points
• a draw – 5 points
• a loss – 0 points.
2210/23/O/N/23 – 10 (A weather station takes temperature readings once an
hour for a week. These temperatures are
stored in a two-dimensional (2D) array Temperatures[]
Each column contains 24 readings for a single day. The first temperature is
recorded at 00:00 and
the final temperature at 23:00. There are seven columns, one for each day of the
week, starting
with Monday and ending with Sunday.)
0478/22/F/M/24 - 11
Students in a class are recording the amount of time in minutes spent in front of
a screen for each
day of the week.
The one-dimensional (1D) array StudentName[] contains the names of the
students in the class.
The two-dimensional (2D) array ScreenTime[] is used to input the number of
minutes on each
day spent in front of a screen.
The position of each student’s data in the two arrays is the same. For example,
the student stored
at index 10 in StudentName[] and ScreenTime[] is the same.
2210/22/O/N/23 – 11 (A wood flooring company stores the names of up to 100
customers in a one‑dimensional (1D) array
Customers[]. A two‑dimensional (2D) array Quotations[] stores details of each
customer’s quotation.
The data are stored in two 1D arrays named WoodType[] and Price[]. The index
of the wood type and price in their arrays share the same index number.
0478/23/M/J/23 – 11 (A two-dimensional (2D) array Contacts[] is used to store
names and telephone numbers. All
the data is stored as strings. The array must have the capacity to store 100
contacts in the form of:
• column 1 – contact names as: last name, first name
for example: Smith, John
• column 2 – telephone numbers.
The variable CurrentSize shows how many contacts are in the array.)

2210/21/M/J/23 – 11 (A one-dimensional (1D) array Days[] contains the names


of the days of the week. A
two-dimensional (2D) array Readings[] is used to store 24 temperature
readings, taken once
an hour, for each of the seven days of the week. A 1D array AverageTemp[] is
used to store the
average temperature for each day of the week.
The position of any day’s data is the same in all three arrays. For example, if
Wednesday is
in index 4 of Days[], Wednesday’s temperature readings are in index 4 of
Readings[] and
Wednesday’s average temperature is in index 4 of AverageTemp[])
2210/22/M/J/23 – 12 (A two-dimensional (2D) array Account[] contains
account holders’ names and passwords for a
banking program.
A 2D array AccDetails[] has three columns containing the following details:
• column one stores the balance – the amount of money in the account, for
example 250.00
• column two stores the overdraft limit – the maximum total amount an account
holder can
borrow from the bank after the account balance reaches 0.00, for example
100.00
• column three stores the withdrawal limit – the amount of money that can be
withdrawn at one
time, for example 200.00
The amount of money in a bank account can be negative (overdrawn) but not
by more than the
overdraft limit.
For example, an account with an overdraft limit of 100.00 must have a balance
that is greater than
or equal to –100.00
Suitable error messages must be displayed if a withdrawal cannot take place,
for example if the
overdraft limit or the size of withdrawal is exceeded.
The bank account ID gives the index of each account holder’s data held in the
two arrays.
For example, account ID 20’s details would be held in:
Account[20,1] and Account[20,2]
AccDetails[20,1] AccDetails[20,2] and AccDetails[20,3])
0478/22/F/M/23 – 11 (The one-dimensional (1D) array TeamName[] contains
the names of teams in a sports league.
The two-dimensional (2D) array TeamPoints[] contains the points awarded for
each match.
The position of each team’s data in the two arrays is the same. For example, the
team stored at
index 10 in TeamName[] and TeamPoints[] is the same.
The variable LeagueSize contains the number of teams in the league. The
variable MatchNo
contains the number of matches played. All teams have played the same
number of matches.
The arrays and variables have already been set up and the data stored.)

2210/22/M/J/24 – 2 (Four logic functions and five standard symbols for logic
gates are shown.
Draw one line to link each logic function to its standard symbol. Not all
standard symbols will be
used.)
2210/22/M/J/24 – 8 Scenario based (A logic circuit is to be built to control the
opening of a safe used to store money. There are two
keys, A and B, and a time switch C. The safe can only open if both keys are
used and the time
switch is off. Write the logic expression for this problem., Complete the truth
table for this problem)
2210/21/M/J/24 – 8 (Consider the logic expression:
Z = (R OR NOT T) XOR (NOT S AND T)
(a) Draw a logic circuit for this logic expression.
Each logic gate must have a maximum of two inputs.
Do not simplify this logic expression., Complete the truth table from the given
logic expression.)
0478/22/F/M/24 – 7 (Consider the logic expression:
X = (A XOR B) AND (NOT B AND C)
Chapter 10 (Boolean (a) Draw a logic circuit for this logic expression. Each logic gate must have a
logic) maximum of two
inputs. Do not simplify this logic expression.), Complete the truth table from
the given logic expression.
2210/23/O/N/23 – 6 (The only time the output is 1 is when both inputs are 1.
Logic gate ...............................................
Complete the truth table for this description., The output is 1 when both inputs
are different.
Logic gate ...............................................
Complete the truth table for this description, The only time the output is 1 is
when both inputs are 0.
Logic gate ...............................................
Complete the truth table for this description),
(d) Consider this logic expression:
X = (NOT A OR NOT B) OR NOT C
2210/22/O/N/23 – 9 a (Consider the logic expression:
Z = (A NAND B) OR NOT (B XOR C)
(a) Draw a logic circuit for this logic expression., 9 b (Complete the truth table
from the given logic expression.)
0478/23/M/J/23 – 8 (Draw a logic circuit for this logic expression.
Each logic gate must have a maximum of two inputs.), Complete the truth table
from the given logic expression.)
2210/21/M/J/23 – 9 (Draw a logic circuit for this logic expression.
Each logic gate must have a maximum of two inputs.
Do not simplify this logic expression.), Complete the truth table from the given
logic expression.)
2210/22/M/J/23 – 2 (Four logic gates and five standard symbols for logic gates
are shown.
Draw one line to link each logic gate to its standard symbol. Not all standard
symbols will be used.)
2210/22/M/J/23 – 8 (Consider this logic expression.
X = (A OR B) AND (NOT B AND C)
Complete the truth table for this logic expression.
0478/22/F/M/23 – 7 a Consider this logic expression.
X = (A OR NOT B) AND (B AND NOT C)
(a) Draw a logic circuit for this logic expression. Each logic gate must have a
maximum of two
inputs. Do not simplify this logic expression., 7 b (Complete the truth table
from the given logic expression.)
2210/13/O/N/22 – 5 a (Consider the logic statement:
X = ((((B AND C) OR NOT C) NOR B) XOR NOT A)
(a) Draw a logic circuit to represent the given logic statement.
Do not attempt to simplify the logic statement. All logic gates must have a
maximum of two inputs.), 5 b (Complete the truth table for the given logic
statement.)
2210/12/O/N/22 – 7 (Four statements are shown about the logic gates.
Tick (✓) to show which statements apply to each logic gate. Some statements
may apply to more than one logic gate., State the name of one other logic gate
and complete its truth table.
Logic gate )
2210/12/M/J/22 – 5 (Consider the following logic statement:
X = ((A OR B) AND (NOT (B XOR C)) AND C)
(a) Draw a logic circuit to represent the given logic statement.), Complete the
truth table for the given logic statement,

2210/12/O/N/21 - 11 Consider the following logic statement:


X = (((A AND B) OR (NOT (B OR C))) NAND C)
(a) Draw a logic circuit to represent the given logic statement.
(b) Complete the truth table for the given logic statement.
(c) Identify two logic gates that are not included in the given logic statement
2210/11/M/J/21 – 6 a (logic circuit from statement), 6 b (finding errors in truth
table)
2210/12/M/J/21 – 3 a (a (logic circuit from statement), 3 b (finding errors in
truth table)
2210/12/M/J/20-4 a (identification of gate symbol), 4 b (truth table from a logic
expression)
2210/12/O/N/20-4 (drawing logic circuit from expression and truth table)
2210/13/O/N/20-10 (drawing logic circuit from expression and truth table)
2210/11/M/J/19-2 (finding the gates from statements)

2210/12/M/J/19-8 (drawing logic circuit from expression and truth table)


2210/12/O/N/19-8 (writing logic expression from a circuit and then the truth
table)
2210/13/O/N/19-4a, 4b (scenario based drawing of logic circuit and truth table)
2210/11/M/J/18-6 (drawing logic circuit from expression and truth table)
2210/12/M/J/18-7 (drawing logic circuit from expression and truth table)
2210/12/O/N/18-3 (scenario based drawing of logic circuit and truth table)
2210/13/O/N/18-10 a (truth table from a circuit), 10 b (drawing logic circuit
from expression and truth table)
2210/11/M/J/17-10 a (truth table for NOR gate), 10 b (logic expression from
circuit)
2210/12/M/J/17-10 (drawing logic circuit from expression and truth table)
2210/12/O/N/17-7 (drawing circuit from expression)
2210/13/O/N/17-5 a (drawing circuit from expression), 5 b (function of XOR
gate)
2210/11/M/J/16-5 (scenario based drawing of logic circuit and truth table)
2210/12/M/J/16-7 a (truth table from expression), 7 b (drawing circuit from
expression), 7 c (redrawing a circuit using NAND gates only)
2210/12/O/N/16-7 a (truth table using universal gates), 7 b (drawing circuit
from expression)
2210/13/O/N/16-5a, 5b (scenario based drawing of logic circuit and truth table)
2210/11/M/J/15-3 a (truth table from circuit), 3 b (drawing circuit from
expression), 3 c (writing expression from circuit)
2210/12/M/J/15-6 (scenario based drawing of logic circuit and truth table, truth
table of XOR gate)
0478/12/F/M/22 – 3 a (Tick (3) to show which logic gates will give an output of
1 for the given inputs A and B.), 3 b (Draw the logic circuit for the given logic
statement:
X = (A XOR B) AND (B OR NOT C)
0478/12/F/M/21 – 5 a (names of logic gates from truth table), 5 b (scenario
based drawing of logic circuit)
0478/12/F/M/20 – 6 a (truth table), 6 b (scenario based drawing of logic circuit)
0478/12/F/M/19 – 5 a (logic circuit from logic expression), 5 b (truth table)

0478/12/F/M/18 – 7 a (truth table), 7 b (logic circuit from logic expression), 7 c


(truth table)
0478/12/F/M/17 – 2 (matching of different gates with symbol), 14 (scenario
based drawing of logic circuit and truth table)
9608/11/M/J/20 – 5 a (truth table), 5 b - 3

2210/22/M/J/24 – 1 (Tick (✓) one box to identify a method used to design and
construct a solution to a computing
problem.)

Others 2210/22/M/J/24 – 5 (A high-level programming language makes use of


arithmetic, Boolean and logical operators.
State how each type of operator is used.
Give an example statement, in pseudocode, for each one. Arithmetic, Boolean,
Logical

You might also like